Overview
This is a repackaged open source software product wherein additional charges apply for the development of the included security components and security updates provided by CIQ. As the speed, sophistication, and volume of attacks on corporate systems accelerate, CISOs and IT security teams struggle to apply an effective and consistent Linux security policy across all their servers. With Rocky Linux from CIQ - Hardened (RLC-H), you get Enterprise Linux and can be assured that it is delivered securely, configured correctly, and is proactively protecting your apps and services from malicious threats.
RLC-H comes pre-configured against key threat vectors, and delivers hardened kernel and memory integrity checking in runtime. The operating system is pre-harened and offers further options to apply OpenSCAP policies to apply in compliant environments like DISA-STIG and CIS. Going beyond reactive security, RLC-H takes a proactive approach to keeping your operating environment safe, and eliminates manual work spent tuning and applying security profiles so you can meet corporate and audit requirements easily and effectively.
As the speed, sophistication, and volume of attacks on corporate systems accelerate, CISOs and IT security teams struggle to apply an effective and consistent Linux security policy across all their servers. With RLC-H, you get Enterprise Linux and can be assured that it is delivered securely, configured correctly, and is proactively protecting your apps and services from malicious threats.
Highlights
- Hardened packages, hardened OpenSSH, and hardened_malloc reduce the surface area of the system through removal of non-essential libraries, removal of unsafe environment variables when crossing a privilege boundary, and add defense against heap exploitation techniques.
- LKRG Threat Detection and Response: Linux Kernel Runtime Guard (LKRG) detects kernel vulnerability exploits and identifies and responds to unauthorized modifications of a running kernel and its security-critical data (notably including task credentials).
- RLC-H implements stronger password policies with passwordqc and yescrypt hashing for increased resistance to GPU password cracking. CIQ cryptographically validates all packages and provides an SBOM with each image. And CIQ delivers patches for especially important CVEs ahead of standard updates, significantly reducing exposure time.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
- ...
Dimension | Cost/hour |
---|---|
c4.large Recommended | $0.06 |
t3.micro AWS Free Tier | $0.06 |
t2.micro AWS Free Tier | $0.06 |
m5dn.8xlarge | $0.06 |
d3en.2xlarge | $0.06 |
c7a.metal-48xl | $0.06 |
c6in.2xlarge | $0.06 |
c5d.large | $0.06 |
c5d.xlarge | $0.06 |
m6a.2xlarge | $0.06 |
Vendor refund policy
Refunds are not available, though you may cancel your subscription at any time.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Initial release on AWS based on Rocky Linux 9.6. RLC-H is based on the Latest Release and will automatically update to the latest available versions of the OS as they are released. This version is up-to-date as of August 6th, 2025.
Additional details
Usage instructions
Connect to the instance over SSH using the instance public IP, with username "rocky" and the private key generated when you launched the instance.
-
Example command: $ ssh -i ./ssh-private-key.pem rocky@PublicIPAddress
-
When you are logged in as "rocky", you can use the sudo command to run administrative tasks. Note that the specific command you use to connect to the instance may vary depending on the operating system and ssh client you are using on your end.
-
The firewall is enabled by default with only port 22 open.
Resources
Vendor resources
Support
Vendor support
This RLC-H AMI provided by CIQ includes access to repositories for dnf/rpm updates and is regularly refreshed. Management of the operating system, once deployed, is the responsibility of the purchaser unless you have purchased a separate enterprise support agreement from CIQ.
CIQ is committed to providing a working image which meets the highest quality standards. If you have a question or encounter a problem related to deploying the software in this listing into your cloud environment, a question regarding the EULA, or if you are in interested in adding an enterprise support agreement via private offer for help managing your Rocky Linux operating system, contact CIQ Cloud Marketplace Operations at cloudmarketplace@ciq.com .
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.