Overview
This is a repackaged software product wherein additional charges apply for the extensive security hardening and ongoing seller premium support included with this image.
Each instance is built from a clean upstream Rocky Linux 10 release and then hardened to STIG standards through a rigorous multi stage automated process that applies hundreds of security controls, reduces attack surface, and creates a compliant baseline from first boot. Our team maintains these hardened baselines, validates updates, and provides premium support to help customers deploy confidently into high security and regulated environments such as government, defense, healthcare, and finance.
Organizations choose hardened STIG compliant images when they need a secure foundation they can trust from day one. These images support compliance requirements, regulated workloads, zero trust initiatives, and mission critical systems that cannot tolerate misconfigurations or security drift. They remove the need to build and maintain your own secure baseline, reduce operational overhead, and provide consistent and repeatable security across large fleets.
VM Pro Support has been a dedicated provider of hardened infrastructure since 2021 and is trusted by hundreds of enterprise organizations and government customers who rely on our images in their most sensitive environments. Our work supports systems that operate without interruption, protect critical workloads, and require absolute confidence in their security posture. We deliver hardened images that perform reliably at scale and we stand behind them with consistent and dependable support that customers count on every single day.
Highlights
- STIG hardened Rocky Linux 10 image that applies hundreds of verified security controls to deliver a secure and compliant baseline from the very first boot.
- Purpose built for high security and regulated environments including government, defense, healthcare, and finance where strong security and consistency are mandatory.
- Backed by VM Pro Support with continuously maintained hardened baselines and dependable premium support trusted by hundreds of enterprise and government customers.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
- ...
Dimension | Cost/hour |
|---|---|
t3a.medium Recommended | $0.80 |
t3.micro | $0.80 |
m5dn.4xlarge | $1.50 |
c6a.8xlarge | $1.50 |
r7iz.xlarge | $1.50 |
c8i-flex.4xlarge | $1.50 |
c6i.xlarge | $1.50 |
c6id.large | $1.50 |
vt1.3xlarge | $1.50 |
inf1.6xlarge | $1.50 |
Vendor refund policy
Refunds are not available. You can reach our support team directly at support@vmprosupport.com for all questions.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
First release of Rocky Linux 10 hardened STIG-compliant image with premium support by VMPS
Additional details
Usage instructions
Connecting to your instance
After launching your hardened Rocky Linux 10 instance, the recommended connection method is AWS Systems Manager Session Manager SSM. This provides a secure and fully managed way to access the instance without opening inbound ports. Detailed instructions are available at https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.htmlÂ
If you choose to connect with SSH, use the default username rocky along with your private key file and the instance public IP address. Connect on port 22 using the format:
ssh -i /path/to/your-key.pem rocky@public-ip-address
For full guidance, refer to https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AccessingInstances.htmlÂ
Security recommendations
For the strongest security posture, avoid exposing your instance directly to the public internet. If SSH access is required, restrict your security group to trusted IP addresses only.
This image is preconfigured to meet STIG requirements. Because of the strict controls in place, some services or workflows may require additional configuration to operate correctly. This is normal for a hardened environment.
Support
Once connected, you may install and run applications as needed. This instance includes premium OS support. If you need assistance, contact support@vmprosupport.com at any time.
Support
Vendor support
This instance includes limited premium OS support designed to assist with both standard OS operations and security specific concerns related to the hardened configuration. You can reach our team directly at support@vmprosupport.comÂ
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
