An IIHT Company

This meticulously fortified image incorporates the cybersecurity directives of the Department of Defense (DoD), which encompass an additional set of stringent requirements for IT products deployed within DoD agencies. These guidelines cover configuration recommendations for network devices, software, databases, and operating systems.

Brought to you by the world’s largest cloud provider, these hardened images are designed to assist you in setting up a cloud infrastructure that adheres to the highest security standards right from the outset.

It’s important to note that, for operational reasons and when running specific stacks, some compliance measures have been set at a mandatory high-risk level. However, it’s worth highlighting that the majority of recommendations to mitigate even the lowest risks have already been integrated into this solution.