Overview
Compliant Enterprise Ready
Go beyond the baseline with a production-ready, CIS Level 1 hardened Ubuntu 24.04 LTS AMI, architected for enterprises that demand security, compliance, and provability. While standard hardened images meet the benchmark, this AMI delivers a complete, audit-ready solution out-of-the-box, saving your security and DevOps teams hundreds of hours in configuration, tool deployment, and audit preparation.
This is more than a hardened OS; it's a secure foundation designed for your business-critical applications on AWS. We provide a fully automated and transparent hardening process, complete with a comprehensive suite of pre-configured security tools and detailed reports that offer an unparalleled audit trail of all actions taken.
Key Differentiators: Go Beyond Baseline Hardening
Built-in Threat Defense Suite: Unlike other images, this AMI includes a pre-configured suite of industry-standard security tools, providing active threat detection from the moment you launch. This includes ClamAV for anti-malware, rkhunter and chkrootkit for rootkit scanning, and AIDE for file integrity monitoring (a key requirement for PCI 4.0 DSS).
Unmatched Transparency with Audit-Ready Reporting: Every instance launched from this AMI includes the /home/ubuntu/SiXCraft_Hardened_Reports directory. This folder provides a complete, human-readable audit trail of the hardening process, including pre- and post-hardening package lists, a detailed log of every command executed, and a list of SUID/SGID files for your review drastically simplifying evidence gathering for auditors.
Ready for Cloud-Native Monitoring: This AMI is built for modern cloud operations. It comes with the AWS Systems Manager and CloudWatch agents pre-configured to seamlessly send your hardening logs and security alerts to AWS Security Hub and can be validated by Amazon Inspector, enabling continuous compliance monitoring in a centralized security dashboard.
Key Benefits for Your Organization
Accelerate Compliance & Audits: Achieve a 99% CIS compliance score out-of-the-box and provide auditors with the detailed reports they need, reducing audit preparation time from weeks to minutes. The pre-hardened state and included tools directly support requirements for PCI 4.0 DSS, HIPAA, SOC 2, and other major frameworks.
Reduce Your Attack Surface: The combination of CIS Level 1 hardening and the integrated Threat Defense Suite actively protects your instances from common vulnerabilities, malware, and unauthorized changes, minimizing your security risk.
Faster, More Secure Deployments: Launch secure, production-ready servers in minutes. By providing a pre-configured, fully tested foundation, you empower your development teams to build and deploy applications faster without compromising on security.
Improve Operational Efficiency: Eliminate hundreds of hours of manual hardening and security tool configuration. This AMI provides a consistent, automated, and verifiable security baseline across all your environments, from development to production.
Included Reports and Files
To demonstrate full transparency and assist with your compliance documentation, each AMI includes the following files in /home/ubuntu/SiXCraft_Hardened_Reports:
-
basevm.txt & basevm-snaps.txt: A complete list of all packages and snaps present on the base OS before hardening.
-
afterhardening.txt & afterhardening-snaps.txt: A complete list of packages and snaps after the hardening script has been applied.
-
main.log: A detailed, time-stamped log of every action and command executed by the hardening script.
-
summary_report.txt: A high-level summary of the hardening process, including the final compliance score.
-
suid_sgid_review_list.txt: A generated list of executables with special permissions for your manual review and justification.
-
Exceptions.txt: A template for you to document any necessary exceptions for your specific environment.
Highlights
- Go Beyond Compliance with an Audit-Ready Foundation: This AMI is hardened to 99% CIS Level 1 compliance and includes detailed, pre-generated reports, providing a complete audit trail of all hardening actions to drastically simplify your PCI 4.0 DSS, HIPAA, and SOC 2 evidence gathering.
- Integrated Threat Defense Suite Included: Move beyond a simple hardened OS with a built-in, pre-configured security suite, including ClamAV (anti-malware), rkhunter (rootkit detection), and AIDE (file integrity monitoring), for active threat detection from the moment you launch.
- Built for Secure Cloud Operations: This enterprise-ready image is designed for modern cloud environments, featuring pre-configured agents to seamlessly integrate with AWS Security Hub and Amazon Inspector for continuous, centralized compliance monitoring.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
- ...
Dimension | Cost/hour |
---|---|
t4g.medium Recommended | $0.02 |
m6g.4xlarge | $0.16 |
c8gn.medium | $0.02 |
c6gn.8xlarge | $0.16 |
m8g.medium | $0.02 |
c6gn.large | $0.04 |
r8gd.metal-24xl | $0.64 |
c6gd.16xlarge | $0.32 |
m7g.medium | $0.02 |
m7g.4xlarge | $0.16 |
Vendor refund policy
Your satisfaction is our priority. This refund policy applies only to the software fees for our AMI; we do not offer refunds for AWS infrastructure costs. All refund requests are reviewed on a case-by-case basis. To request a refund, please contact our support team with your AWS Account ID and a detailed description of the issue.
Contact: info@sixcraft.coÂ
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (Arm) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Version: v2025.08.09 Release Date: August 9, 2025
Initial Release: The Audit-Ready, Enterprise Secure Ubuntu 24.04 LTS
This is the inaugural release of the Enterprise Secure Ubuntu 24.04 LTS by Six Craft Group. This Amazon Machine Image (AMI) is designed from the ground up to provide a secure, compliant, and production-ready foundation for business-critical applications on AWS.
This version focuses on three core principles: deep security hardening, unparalleled transparency through reporting, and a built-in suite of threat defense tools to go beyond baseline compliance.
Key Features & Improvements:
CIS Level 1 Hardening: The AMI is fully hardened to be 99% compliant with the CIS Ubuntu Linux 24.04 LTS Benchmark. All remediations for partitioning, user accounts, network parameters, and file permissions have been applied. Audit-Ready Reporting Suite: Every instance includes the /home/ubuntu/SiXCraft_Hardened_Reports directory, containing a complete audit trail of the hardening process. This includes pre- and post-hardening package lists, a detailed command log, and a final compliance summary to drastically simplify evidence gathering for PCI 4.0 DSS, HIPAA, and SOC 2 audits. Integrated Threat Defense Suite: This version comes pre-configured with a suite of industry-standard security tools for active threat detection: AIDE for File Integrity Monitoring (FIM). ClamAV for anti-malware scanning. rkhunter and chkrootkit for rootkit detection. Automated Filesystem Partitioning: All required CIS partitions (/tmp, /var, /var/log, /var/log/audit, /home) are automatically created, formatted, and mounted at launch, ensuring a secure and compliant disk layout. Cloud-Native Integration: The AMI is built for modern cloud operations, with the AWS Systems Manager and CloudWatch agents pre-configured to seamlessly send security and compliance logs to your AWS environment for centralized monitoring.Known Issues & Important Notes:
The hardening process generates a list of remaining SUID/SGID executables that are necessary for system operation (e.g., sudo, passwd). As per CIS guidelines, it is recommended that you review this list (located in the reports directory) and formally document your acceptance in the provided Exceptions.txt file.Additional details
Usage instructions
Thank you for choosing the Enterprise Secure Ubuntu 24.04 LTS by Six Craft Group. This guide will walk you through launching and configuring your hardened AMI.
Step 1: Launching Your Instance
Navigate to EC2: From the AWS Console, go to EC2 and click "Launch instances." Choose AMI: In the "Application and OS Images" catalog, go to "My AMIs" and select the "Enterprise Secure Ubuntu 24.04 LTS" AMI. Select Instance Type: This AMI is built for the arm64 architecture. You must choose an AWS Graviton-based instance type, such as t4g.medium or any other g-series instance (e.g., m6g, c6g). Key Pair: Select or create a key pair for SSH access. Network Settings: Configure a security group that allows inbound SSH (port 22) from your IP and outbound HTTPS (port 443) to the internet. The outbound rule is required for AWS agents to function. Launch: Review your settings and click "Launch instance."Step 2: Connecting and Verifying
Once the instance is running, connect via SSH using the ubuntu username and your private key. ssh -i "your-key.pem" ubuntu@INSTANCE_PUBLIC_IP Upon logging in, you can immediately verify the hardening by exploring the comprehensive audit reports located in the home directory: cd /home/ubuntu/SiXCraft_Hardened_Reports Key files in this directory include: summary_report.txt: A high-level summary with the final compliance score. main.log: A detailed, time-stamped log of every command executed during the hardening process. suid_sgid_review_list.txt: A list of executables with special permissions for your manual review, as required by CIS guidelines.Step 3: Integrating with AWS Security Services
This AMI is pre-configured and ready for immediate integration with AWS security services.
AWS Systems Manager (SSM): The SSM agent is running. Your instance will automatically appear in the Fleet Manager of the Systems Manager console. Amazon CloudWatch: The CloudWatch agent is installed and configured to send hardening logs to a log group named CIS-Hardening-Logs. Amazon Inspector: The required SSM agent is active, making this AMI ready for continuous vulnerability and compliance scanning. To enable: Navigate to the Amazon Inspector service in the AWS Console and click "Enable Inspector". It will automatically discover and start scanning your instance. For CIS compliance checks, ensure "CIS security scans" is enabled in the Inspector scan settings.Step 4: Important Security Considerations
SUID/SGID Review: As per CIS guidelines, it is a best practice to review the suid_sgid_review_list.txt file and formally document your acceptance of the necessary executables in the provided Exceptions.txt file. Security Groups: After deploying your application, restrict your security group rules to the minimum necessary ports and source IPs to maintain a secure posture.Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products

