Overview
This CentOS 10 virtual machine image is fully preconfigured with Foundation Security's Level 2 hardening framework and deploys in minutes. Level 2 builds on our Level 1 secure baseline by adding additional and more stringent security measures intended for high-security and highly regulated workloads.
This enhanced profile includes stricter authentication policies, advanced logging and auditing, stronger access control rules, and additional system lockdown configurations to further reduce the attack surface. Foundation Level 2 is intended for environments where security requirements exceed standard enterprise baselines - such as workloads involving sensitive data, regulated industries, or mission-critical systems where risk tolerance is extremely low.
By applying these advanced controls prior to launch, this image eliminates the extensive engineering effort typically required to achieve such a hardened state on a baseline operating system. It reduces the risk of misconfiguration, enforces stricter security boundaries, and ensures a consistent, repeatable high-security posture from day one.
Foundation Security images are updated regularly to incorporate the latest security enhancements and to maintain alignment with evolving threat landscapes. This offering is ideal for organizations that require the highest practical level of operating system security while maintaining performance and operational stability.
Foundation Security has a team of industry experts with deep knowledge of advanced hardening, compliance, and secure system design, ensuring every image is built and maintained to the highest standards. The team also provides ongoing support to help customers maintain this advanced security posture over time
Foundation Security is a proud AWS Partner focused on delivering hardened operating system images for security-conscious organizations. Our images are trusted by several Fortune 500 companies and leading organizations in regulated industries, demonstrating the reliability and proven track record of our solutions.
Highlights
- Maximum Security Baseline: Deploy a fully preconfigured CentOS 10 virtual machine image hardened with Foundation Level 2 controls in minutes. This profile enforces more stringent security measures than Level 1, designed for organizations with the highest security requirements.
- Advanced Hardening Measures: Level 2 includes stricter authentication policies, enhanced logging and auditing, tighter access controls, and additional system lockdown settings to minimize risk in high-security environments.
- Trusted Expertise: Built and maintained by Foundation Security, a proud AWS Partner delivering advanced hardened operating system images. Our images are trusted by Fortune 500 companies and regulated industries, and are continuously updated to stay ahead of emerging threats.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
- ...
Dimension | Cost/hour |
---|---|
t4g.medium Recommended | $0.14 |
r7g.medium | $0.14 |
c6g.large | $0.29 |
c6g.8xlarge | $0.49 |
c6gn.2xlarge | $0.49 |
c8g.24xlarge | $0.49 |
a1.xlarge | $0.49 |
c8gd.24xlarge | $0.49 |
c6gd.xlarge | $0.49 |
r7gd.medium | $0.14 |
Vendor refund policy
Refunds through AWS are not available at this time. You will only be billed for actual time of instance use. As with all Foundation Security products, our aim is always 100 percent customer/member satisfaction.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (Arm) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
This is the initial release of the Foundation Level 2 Hardened CentOS 10 image by Foundation Security
Additional details
Usage instructions
Quick Start
Launch your CentOS 10 instance and connect using SSH on port 22. The default username is ec2-user.
Example: ssh -i /path/to/your-key.pem ec2-user@<public-ip-address>
For step-by-step instructions, see: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AccessingInstances.htmlÂ
For improved security, we recommend connecting through AWS Systems Manager Session Manager when possible: https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.htmlÂ
If you connect over SSH, configure your security group to allow access only from your trusted IP address.
This image has been fully hardened with Foundation Level 2 security controls applied and validated before release. No additional hardening steps are required after launch.
Once connected, you can immediately begin installing and running your applications on a secure, advanced-hardened baseline.
Resources
Vendor resources
Support
Vendor support
Our knowledgeable support team is readily available to answer any questions you may have regarding our virtual machine images. Please feel free to contact us if you need any further information - we are always here to help. Reach out directly at support@foundationvm.comÂ
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.