Overview
This Red Hat 9 virtual machine image is fully preconfigured with Foundation Security's Level 1 hardening framework and deploys in minutes. It eliminates the weeks of manual security configuration typically required with a baseline operating system and delivers a thoroughly tested secure foundation out of the box
Foundation Level 1 is our in-house security baseline, developed by our team of compliance and security experts to protect workloads from common vulnerabilities and misconfigurations. It applies hundreds of security controls and system hardening measures across authentication, permissions, logging, and network configuration to ensure a strong security posture from the moment the instance launches. Unlike generic images, this hardened image reduces the risk of misconfiguration, accelerates secure deployment, and provides a consistent and repeatable environment for production workloads.
Foundation Security images are updated regularly to stay ahead of evolving security threats and to maintain alignment with our latest hardening recommendations. This offering is ideal for organizations that want an enterprise-grade secure baseline without the complexity of managing a compliance framework themselves.
Foundation Security has a team of industry experts with deep knowledge of security and compliance regulations, ensuring every image is built and maintained to the highest standards.
The team also provides ongoing support to help customers maintain a strong security posture over time. Foundation Security is a proud AWS Partner focused on delivering hardened operating system images for regulated industries and security-conscious organizations. Our images are trusted by several Fortune 500 companies, demonstrating the reliability and proven track record of our solutions.
Highlights
- Accelerated Secure Deployment: Deploy a fully preconfigured Red Hat 9 virtual machine image hardened with Foundation Level 1 controls in minutes. This eliminates the weeks of manual security configuration required with a baseline operating system, helping your organization launch securely and efficiently.
- Proven Hardened Baseline: This image includes hundreds of tested security controls developed by Foundation Security to mitigate common vulnerabilities and reduce the risk of misconfiguration from day one. It is designed to protect workloads in production and regulated environments.
- Trusted Expertise: Built and maintained by Foundation Security, a proud AWS Partner delivering hardened operating system images for security-conscious organizations. Our images are trusted by Fortune 500 companies and are continuously updated to stay aligned with evolving security threats.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
- ...
Dimension | Cost/hour |
---|---|
t4g.medium Recommended | $0.14 |
m7gd.8xlarge | $0.49 |
m7g.xlarge | $0.49 |
hpc7g.4xlarge | $0.49 |
t4g.large | $0.29 |
x8g.large | $0.29 |
r7g.16xlarge | $0.49 |
r8g.48xlarge | $0.49 |
r7gd.16xlarge | $0.49 |
m6g.12xlarge | $0.49 |
Vendor refund policy
Refunds through AWS are not available at this time. You will only be billed for actual time of instance use. As with all Foundation Security products, our aim is always 100 percent customer/member satisfaction.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (Arm) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
This is the initial release of the Foundation Level 1 Hardened Red Hat 9 image by Foundation Security
Additional details
Usage instructions
Quick Start
Launch your Red Hat 9 instance and connect using SSH on port 22. The default username is ec2-user.
Example: ssh -i /path/to/your-key.pem ec2-user@<public-ip-address>
For step-by-step instructions, see: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AccessingInstances.htmlÂ
For improved security, we recommend connecting through AWS Systems Manager Session Manager when possible: https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.htmlÂ
If you connect over SSH, configure your security group to allow access only from your trusted IP address.
This image has been fully hardened with Foundation Level 1 security controls applied and validated before release. No additional hardening steps are required after launch.
Once connected, you can immediately begin installing and running your applications on a secure, hardened baseline.
Resources
Vendor resources
Support
Vendor support
Our knowledgeable support team is readily available to answer any questions you may have regarding our virtual machine images. Please feel free to contact us if you need any further information - we are always here to help. Reach out directly at support@foundationvm.comÂ
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.