We developed this baseline for our work building a secure cyber physical infrastructure for our Department of Defense (DoD) customers and supporting a continued Authority to Operate (ATO) within operationally deployed systems.
As we worked to cloud connect Air Force Operational Technology / Control Systems (OT/CS) over the past 3 years, we kept running into the same problem. Any time we’d spin up a new Amazon Web Services (AWS) Elastic Compute Cloud instance (EC2), we’d have to bring the image into full compliance for our Authority to Operate (ATO) on the defense network.
Every defense contractor developing on AWS has to go through the same process, resulting in hundreds or even thousands of hours a year of duplicate labor. There hasn’t been a ready-built, DoD compliant, constantly updated operating system image available. So we built one.
Specifically hardened to support Department of Defense programs and provide a secure baseline OS for rapid implementation, integration, and compliance.
Reduces time to obtain and maintain an Authority to Operate (ATO) by leveraging baselines used in pre-existing programs.
The provided Amazon Machine Image (AMI) is hardened per Defense Information Security Agency (DISA) Security Technical Implementation Guidelines (STIG)s and scanned for validation with industry leading tools to ensure a secure baseline.
Interested in learning more about our STIG Hardened Amazon Linux 2 image and how it can help your team? Find resources below to learn more.
Find the AMI in the AWS Marketplace to find more details about pricing and to purchase and implement the STIG Hardened AL2 AMI.
Access the developer portal to learn more about how our STIG Hardened AMI works and how you can implement it in your workflow.
Reach out to find out more about our AMI offerings, how to use AMIs, or to consult with our team.
Simplesense leverages the latest DoD-compliant software tools and open frameworks, as well as our network of technology partners, to build cyber physical infrastructure that outperforms traditional network models on security and scalability.