This image of CentOS Linux 8 is preconfigured by CIS to the recommendations in the associated CIS Benchmark. CIS Benchmarks are vendor agnostic, consensus-based security configuration guides both developed and accepted by government, business, industry, and academia. CIS Benchmarks also provide a foundation to comply with numerous cybersecurity frameworks.
Cloud environments and operating systems are not secure by default. Launching an image hardened according to the trusted security configuration baselines prescribed by a CIS Benchmark will reduce cost, time, and risk to an organization. This image has been hardened by CIS and is configured with the majority of the recommendations included in the free PDF version of the corresponding CIS Benchmark. The Level 1 Profile settings within the CIS Benchmark have been applied with the intent to provide a clear security benefit without inhibiting the utility of the technology beyond acceptable means.
To learn more or access the corresponding CIS Benchmark, please visit the Center for Internet Security website or visit our community platform, CIS WorkBench.
The Benchmark that is the basis for this image was developed for system and application administrators, security specialists, auditors, help desk professionals, and platform deployment personnel who plan to develop, deploy, assess, or secure solutions that incorporate CentOS Linux 8. CIS Benchmarks are developed in a unique consensus-based process comprised of hundreds of security professionals worldwide as de facto, best-practice configuration standards.