BrandPost: CIS Hardened VMs on AWS Graviton2: Enhancing EC2 Security

The Center for Internet Security (CIS) now offers two CIS Hardened Images on AWS Graviton2 processors: Ubuntu Linux 20.04 and Amazon Linux 2. Amazon Web Services (AWS) custom builds these processors using 64-bit Arm Neoverse cores. AWS Graviton2 processors deliver 40% better price performance compared to current generation x86-based instances, according to AWS. These hardened VMs are two of more than 35 CIS Hardened Images in the AWS Marketplace.AWS Graviton2 + CIS Hardened VMs = Quick, Secure Development Developers building applications for the cloud rely on cloud infrastructure for security, speed, and optimal resource footprint. That's why CIS builds hardened VMs – CIS Hardened Images – to provide enhanced security on Amazon Elastic Compute Cloud (Amazon EC2) instances. CIS configures the Amazon Machine Image (AMI) to CIS Benchmark standards. A community of cybersecurity experts develops these internationally-recognized secure configuration guidelines.To read this article in full, please click here

Nov 30, -0001 - 00:00
 0
BrandPost: CIS Hardened VMs on AWS Graviton2: Enhancing EC2 Security
Techatty All-in-1 Publishing
Techatty All-in-1 Publishing

The Center for Internet Security (CIS) now offers two CIS Hardened Images on AWS Graviton2 processors: Ubuntu Linux 20.04 and Amazon Linux 2. Amazon Web Services (AWS) custom builds these processors using 64-bit Arm Neoverse cores. AWS Graviton2 processors deliver 40% better price performance compared to current generation x86-based instances, according to AWS. These hardened VMs are two of more than 35 CIS Hardened Images in the AWS Marketplace.

AWS Graviton2 + CIS Hardened VMs = Quick, Secure Development

Developers building applications for the cloud rely on cloud infrastructure for security, speed, and optimal resource footprint. That's why CIS builds hardened VMs – CIS Hardened Images – to provide enhanced security on Amazon Elastic Compute Cloud (Amazon EC2) instances. CIS configures the Amazon Machine Image (AMI) to CIS Benchmark standards. A community of cybersecurity experts develops these internationally-recognized secure configuration guidelines.

To read this article in full, please click here

Techatty Connecting the world of tech differently! Read. Write. Learn. Thrive. Make an informed decision without distractions. We are building tech media and publication networks to connect YOU and everyone to reliable information, opportunities, and resources to achieve greater success.