Overview
This CentOS 10 virtual machine image is fully preconfigured to meet DISA STIG compliance standards and deploys in minutes. It eliminates the weeks of manual hardening required with a baseline operating system and delivers hundreds of tested security controls out of the box providing a proven secure foundation for even the most sensitive workloads.
The Defense Information Systems Agency Security Technical Implementation Guides DISA STIG provide a comprehensive set of guidelines for securing information systems and software used by the US Department of Defense. Compliance with DISA STIG ensures that systems are equipped with robust security controls to protect against a wide range of cyber threats.
This is critical for organizations operating in highly sensitive and secure environments such as defense and government sectors. Meeting DISA STIG requirements on a baseline operating system can take weeks of manual configuration and testing.
This preconfigured CentOS 10 image accelerates compliance by removing that burden entirely. It reduces risk from misconfiguration saves engineering resources and provides a tested compliant environment from day one
Foundation Security images are updated regularly to keep pace with the latest security threats and compliance requirements ensuring systems remain secure over time. This offering is ideal for organizations that require a secure and compliant environment to protect sensitive information meet audit requirements and reduce operational risk.
Foundation Security has a team of industry experts with deep knowledge of security and compliance regulations ensuring every image is built and maintained to the highest standards. The team also provides ongoing support to help customers maintain compliance and address evolving security needs. Foundation Security is a proud AWS Partner exclusively focused on helping organizations achieve compliance with NIST STIG and HIPAA standards. Our images are trusted by several Fortune 500 companies demonstrating the reliability and proven track record of our solutions.
Highlights
- Accelerated Compliance: Deploy a fully preconfigured CentOS 10 virtual machine image that meets DISA STIG requirements in minutes. This eliminates the weeks of manual configuration and testing required with a baseline operating system, helping your organization achieve compliance faster and with less effort.
- Proven Security Foundation: This image comes with hundreds of tested security controls already built in, reducing the risk of misconfiguration and strengthening your security posture from day one. It is designed to protect sensitive workloads in highly regulated environments while meeting strict compliance requirements.
- Trusted Expertise: Built and maintained by Foundation Security, a proud AWS Partner focused exclusively on NIST, STIG, and HIPAA compliance. Our images are trusted by several Fortune 500 companies and are continuously updated to stay aligned with the latest security threats and compliance regulations.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
- ...
Dimension | Cost/hour |
---|---|
t4g.medium Recommended | $0.14 |
c6gd.16xlarge | $0.49 |
m7g.medium | $0.14 |
m7g.4xlarge | $0.49 |
g5g.8xlarge | $0.49 |
m6g.4xlarge | $0.49 |
c8gn.medium | $0.14 |
c6gn.8xlarge | $0.49 |
m8g.medium | $0.14 |
c6gn.large | $0.29 |
Vendor refund policy
Refunds through AWS are not available at this time. You will only be billed for actual time of instance use. As with all Foundation Security products, our aim is always 100 percent customer/member satisfaction.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (Arm) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
This is the initial release of the STIG Compliant CentOS 10 image by Foundation Security
Additional details
Usage instructions
Quick Start
Launch your CentOS 10 instance and connect using SSH on port 22. The default username is ec2-user.
Example: ssh -i /path/to/your-key.pem ec2-user@<public-ip-address>
For step-by-step instructions, see: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AccessingInstances.htmlÂ
For improved security, we recommend connecting through AWS Systems Manager Session Manager when possible: https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.htmlÂ
If you connect over SSH, configure your security group to allow access only from your trusted IP address.
This image has been fully hardened with the controls applied and validated before release. No additional hardening steps are required after launch.
Once connected, you can immediately begin installing and running your applications on a secure, compliant VM.
Resources
Vendor resources
Support
Vendor support
Our knowledgeable support team is readily available to answer any questions you may have regarding our virtual machine images. Please feel free to contact us if you need any further information - we are always here to help. Reach out directly at support@foundationvm.comÂ
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.