CIS Hardened Images®

Virtual machine (VM) images are pre-hardened to the CIS Benchmarks™, the only vendor-neutral, independently developed configuration guidance for both public and private industry offering a built-in, on-demand, and scalable secure computing environment.

They are available on major cloud service platforms like AWS, Azure, Google Cloud Platform, and Oracle Cloud.

Check Availability

When operating in the public cloud, the security of your systems and data is ultimately your responsibility. CIS Hardened Images offer built-in secure configuration and compliance with guidance you can trust. They are configured to follow the recommendations of the globally-recognized CIS Benchmarks™, which are the only consensus-based, vendor-agnostic, best-practice security configuration guides both developed and accepted through consensus by government, business, industry, and academia.


Virtual Image vs. Hardened Virtual Image

Virtual machine images offer the same functionality as a physical computer, but off a snapshot of a running instance in a virtual environment. They reside in the cloud and enable you to cost-effectively perform routine computing operations without investing in local hardware and software.

Hardened virtual images offer extra security in the cloud by limiting potential weaknesses that make systems vulnerable to cyber attacks. They help protect against denial of service, unauthorized data access, and other cyber threats.


Enhanced Security and Achieving Compliance

CIS Benchmarks recommendations are designed to support your enterprise’s overall security against cyber attacks, and they map to the CIS Critical Security Controls® (CIS Controls®).

CIS Benchmarks are recognized as a secure configuration standard by:

  • DoD Cloud Computing Security Recommendation Guide (SRG)
  • Payment Card Industry Data Security Standard (PCI DSS)
  • Federal Information Security Management Act (FISMA)
  • Federal Risk and Authorization Management Program (FedRAMP)
  • National Institute of Standards and Technology (NIST)

This recognition also applies to CIS Hardened Images, as their configuration is based on the CIS Benchmarks.

For organizations and industries that want to achieve compliance with Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) standards, CIS offers several CIS Benchmarks mapped to STIG standards. CIS STIG Benchmarks note any DISA STIG recommendations not included in the CIS STIG Benchmarks. From these guidelines, CIS also offers CIS STIG Hardened Images.

Learn More about CIS STIG Hardened Images

Support Clients with an Elevated Level of Cloud Security

In our CIS Hardened Images Reseller Program, we work with managed service providers (MSPs), managed security service providers (MSSPs), and IT consultants to sell CIS Hardened Images to their clients as part of what they already offer. This enables service providers to deliver built-in, cloud-based security configurations as additional value to their clients.

Learn More about Reselling CIS Hardened Images

Start Using CIS Hardened Images

CIS Hardened Images bring the globally recognized secure configuration recommendations of the CIS Benchmarks to the cloud. Securely pre-configured virtual machine images are available to deploy immediately from the major cloud provider marketplaces.

Check Availability

Overview

When operating in the public cloud, the security of your systems and data is ultimately your responsibility. CIS Hardened Images offer built-in secure configuration and compliance with guidance you can trust. They are configured to follow the recommendations of the globally-recognized CIS Benchmarks™, which are the only consensus-based, vendor-agnostic, best-practice security configuration guides both developed and accepted through consensus by government, business, industry, and academia.


Virtual Image vs. Hardened Virtual Image

Virtual machine images offer the same functionality as a physical computer, but off a snapshot of a running instance in a virtual environment. They reside in the cloud and enable you to cost-effectively perform routine computing operations without investing in local hardware and software.

Hardened virtual images offer extra security in the cloud by limiting potential weaknesses that make systems vulnerable to cyber attacks. They help protect against denial of service, unauthorized data access, and other cyber threats.


Enhanced Security and Achieving Compliance

CIS Benchmarks recommendations are designed to support your enterprise’s overall security against cyber attacks, and they map to the CIS Critical Security Controls® (CIS Controls®).

CIS Benchmarks are recognized as a secure configuration standard by:

  • DoD Cloud Computing Security Recommendation Guide (SRG)
  • Payment Card Industry Data Security Standard (PCI DSS)
  • Federal Information Security Management Act (FISMA)
  • Federal Risk and Authorization Management Program (FedRAMP)
  • National Institute of Standards and Technology (NIST)

This recognition also applies to CIS Hardened Images, as their configuration is based on the CIS Benchmarks.

For organizations and industries that want to achieve compliance with Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) standards, CIS offers several CIS Benchmarks mapped to STIG standards. CIS STIG Benchmarks note any DISA STIG recommendations not included in the CIS STIG Benchmarks. From these guidelines, CIS also offers CIS STIG Hardened Images.

Learn More about CIS STIG Hardened Images

Support Clients with an Elevated Level of Cloud Security

In our CIS Hardened Images Reseller Program, we work with managed service providers (MSPs), managed security service providers (MSSPs), and IT consultants to sell CIS Hardened Images to their clients as part of what they already offer. This enables service providers to deliver built-in, cloud-based security configurations as additional value to their clients.

Learn More about Reselling CIS Hardened Images

Start Using CIS Hardened Images

CIS Hardened Images bring the globally recognized secure configuration recommendations of the CIS Benchmarks to the cloud. Securely pre-configured virtual machine images are available to deploy immediately from the major cloud provider marketplaces.

Check Availability

Benefits

The main benefit of CIS Hardened Images is that the secure configurations have already been done for you. But that's not all. Here's how else they can help you.


Cloud icon—surrounded by a shield, a circle with a B with a key hole on it, representing the CIS Security Benchmarks.

Comply with the CIS Benchmarks

Conform to recommended cybersecurity best practices developed and reviewed by experts around the world.


Cloud icon—surrounded by a circle with arrows on it, a clock with a shield at it's center is showing 3 o'clock with an arrow indicating turning back time, representing process time savings.

Save Time and Effort Staying Secure

Enjoy peace of mind that your VM images are optimally configured to defend against malware, denial of service, insufficient authorization, and overlapping trust boundary threats.


Cloud icon—surrounded by a gear, a cloud is above a line with alert and toggle icons underneath, representing misconfigured cloud settings.

Avoid Misconfigurations

We build these images with third-party automation. Utilizing these hardened VM images helps to avoid misconfiguration and other instances of human error that are common with manual hardening.


Cloud icon—surrounded by a gear, the sun comes up over a cloud with a ribbon on it, compliance.

Offers Evidence of Compliance

Each CIS Hardened Image contains the final CIS-CAT Pro Assessor report that illustrates its compliance with the CIS Benchmarks. It also includes any exceptions necessary for that Hardened Image to run in the cloud. This report is integral to providing evidence of compliance on the spot.


Cloud icon—surrounded by a circle, the sun comes up over a cloud with a diamond on it, diamond hardened.

Forego Manual Hardening

Each CIS Hardened Image comes with an out-of-the-box configuration report that shows the configuration of the base OS prior to CIS's hardening. This saves you money, time, and resources when you need to obtain and provide detailed insights into the applied secure configurations.


Cloud icon—surrounded by a shield, a cloud with a folder icon on it, representing cloud architecture.

Complement Your Cybersecurity Architecture

By incorporating CIS Hardened Images into your Infrastructure-as-a-Service (IaaS) architecture and strategy, you can support identity and access management, network traffic protection, and other aspects of your cybersecurity architecture essential for creating a comprehensive approach to cloud security posture management (CSPM).


Cloud icon—surrounded by a circle with arrows, a calendar is behind a cloud, representing cloud update monthly.

Stay up to Date Month to Month

Not only does CIS perform the initial hardening, but we also update our Hardened Images monthly.


Cloud icon—surrounded by a shield there is a cloud with an arrow up and a dollar sign on it, representing cloud security budget.

Make the Most of Your Cloud Security Budget

Eliminate upfront investments in hardware with a cost-effective option to harden your VM images starting at about 2 cents per hour.


Start Using CIS Hardened Images

CIS Hardened Images bring the globally recognized secure configuration recommendations of the CIS Benchmarks to the cloud. Securely pre-configured virtual machine images are available to deploy immediately from the major cloud provider marketplaces.

Check Availability

Marketplace

Virtual Image vs. Hardened Virtual Image


AWS Marketplace

CIS has partnered with AWS to offer CIS Hardened Images on AWS Marketplace, the AWS GovCloud (U.S.) region, and the AWS Intelligence Community. Learn more

Launch on AWS

Azure Marketplace

CIS Hardened Images are available in the Microsoft Azure Marketplace and are Azure-certified. CIS is a Microsoft Partner. Learn more

Deploy on Azure

Google Cloud Platform

Securely configured operating systems are available to spin up from Google Cloud Platform (GCP), where CIS is a partner. Learn more

Deploy on GCP

Oracle Cloud Marketplace

CIS is an Oracle Silver Partner, and CIS Hardened Images are available to deploy on the Oracle Cloud Marketplace. Learn more

Launch on Oracle Cloud



Start Using CIS Hardened Images

CIS Hardened Images bring the globally recognized secure configuration recommendations of the CIS Benchmarks to the cloud. Securely pre-configured virtual machine images are available to deploy immediately from the major cloud provider marketplaces.

Check Availability

Cloud Security Resources

CIS Benchmarks and CIS Hardened Images

Blog Post
CIS Foundations Benchmarks
Free configuration guidance to secure AWS, Azure, GCP, Oracle Cloud, IBM Cloud, and Alibaba Cloud accounts.
Learn more about CIS Foundations Benchmarks
CIS Benchmarks
CIS Benchmarks for Containers
Free configuration guidelines for Docker and Kubernetes to secure ACK, AKS, EKS, OKE, GKE, and Red Hat OpenShift.
Access free guidelines for Docker and Kubernetes
White Paper
How to Keep the Cloud Secure with CIS After Your Migration
Want to stay secure after migrating to the cloud? Download our white paper to learn how three resources from the Center for Internet Security can help.
Secure Your Cloud Foundation After You Migrate
White Paper
The Beginner's Guide to Secure Cloud Configurations
Migration to the cloud isn't without its challenges. Chief among them is the need to ensure security and the protection of data in a cloud environment.
Learn how to secure cloud configurations
White paper
Cloud Security and the Shared Responsibility Model
The CIS Hardened Images are globally-recognized cybersecurity resources that can help cloud consumers meet a portion of the expectations of the shared responsibility model.
Learn about the shared responsibility model
White Paper
CIS Controls v8 Cloud Companion Guide
As community members continue to refine the CIS Critical Security Controls, the call for CIS Controls guidance for the cloud was identified as one of the high-priority companion documents to be developed.
Augment your cloud security with CIS Controls v8
Related Blog Posts
Stay current with the latest CIS Hardened Images updates.
View the latest Blog Posts

Start Using CIS Hardened Images

CIS Hardened Images bring the globally recognized secure configuration recommendations of the CIS Benchmarks to the cloud. Securely pre-configured virtual machine images are available to deploy immediately from the major cloud provider marketplaces.

Check Availability

 

CIS Hardened Image logo

 

Questions about CIS Hardened Images?

Our Cloud Security team can help.

Contact us today

 

Become a Reseller

CIS Hardened Images are available for Cloud Reseller Partners in AWS, Azure, and GCP Marketplaces. 

Get Started