Skip to contentRed Hat

Navigation

AI
  • Our approach

    • News and insights
    • Technical blog
    • Research
    • Live AI events
    • Explore AI at Red Hat
  • Our portfolio

    • Red Hat AI
    • Red Hat Enterprise Linux AI
    • Red Hat OpenShift AI
    • Red Hat AI Inference Server New
  • Engage & learn

    • AI learning hub
    • AI partners
    • Services for AI
Hybrid cloud
  • Use cases

    • Artificial intelligence

      Build, deploy, and monitor AI models and apps.

    • Linux standardization

      Get consistency across operating environments.

    • Application development

      Simplify the way you build, deploy, and manage apps.

    • Automation

      Scale automation and unite tech, teams, and environments.

    • Virtualization

      Modernize operations for virtualized and containerized workloads.

    • Security

      Code, build, deploy, and monitor security-focused software.

    • Edge computing

      Deploy workloads closer to the source with edge technology.

    • Explore solutions
  • Solutions by industry

    • Automotive
    • Financial services
    • Healthcare
    • Industrial sector
    • Media and entertainment
    • Public sector
    • Telecommunications

Discover cloud technologies

Learn how to use our cloud products and solutions at your own pace in the Red Hat® Hybrid Cloud Console.

Products
  • Platforms

    • Red Hat AI

      Develop and deploy AI solutions across the hybrid cloud.

    • Red Hat Enterprise Linux

      Support hybrid cloud innovation on a flexible operating system.

      New version
    • Red Hat OpenShift

      Build, modernize, and deploy apps at scale.

    • Red Hat Ansible Automation Platform

      Implement enterprise-wide automation.

  • Featured

    • Red Hat OpenShift Virtualization Engine
    • Red Hat OpenShift Service on AWS
    • Microsoft Azure Red Hat OpenShift
    • See all products
  • Try & buy

    • Start a trial
    • Buy online
    • Integrate with major cloud providers
  • Services & support

    • Consulting
    • Product support
    • Services for AI
    • Technical Account Management
    • Explore services
Training
  • Training & certification

    • Courses and exams
    • Certifications
    • Red Hat Academy
    • Learning community
    • Learning subscription
    • Explore training
  • Featured

    • Red Hat Certified System Administrator exam
    • Red Hat System Administration I
    • Red Hat Learning Subscription trial (No cost)
    • Red Hat Certified Engineer exam
    • Red Hat Certified OpenShift Administrator exam
  • Services

    • Consulting
    • Partner training
    • Product support
    • Services for AI
    • Technical Account Management
Learn
  • Build your skills

    • Documentation
    • Hands-on labs
    • Hybrid cloud learning hub
    • Interactive learning experiences
    • Training and certification
  • More ways to learn

    • Blog
    • Events and webinars
    • Podcasts and video series
    • Red Hat TV
    • Resource library

For developers

Discover resources and tools to help you build, deliver, and manage cloud-native applications and services.

Partners
  • For customers

    • Our partners
    • Red Hat Ecosystem Catalog
    • Find a partner
  • For partners

    • Partner Connect
    • Become a partner
    • Training
    • Support
    • Access the partner portal

Build solutions powered by trusted partners

Find solutions from our collaborative community of experts and technologies in the Red Hat® Ecosystem Catalog.

Search

I'd like to:

  • Start a trial
  • Manage subscriptions
  • See Red Hat jobs
  • Explore tech topics
  • Contact sales
  • Contact customer service

Help me find:

  • Documentation
  • Developer resources
  • Skills assessments
  • Architecture center
  • Security updates
  • Support cases

I want to learn more about:

  • AI
  • Application modernization
  • Automation
  • Cloud-native applications
  • Linux
  • Virtualization
ConsoleDocsSupportNew For you

Recommended

We'll recommend resources you may like as you browse. Try these suggestions for now.

  • Product trial center
  • Courses and exams
  • All products
  • Tech topics
  • Resource library
Log in

Sign in or create an account to get more from Red Hat

  • World-class support
  • Training resources
  • Product trials
  • Console access

A subscription may be required for some services.

Log in or register
Contact us
  • Home
  • Resources
  • Simplify cloud security with Red Hat Enterprise Linux and AWS

Simplify cloud security with Red Hat Enterprise Linux and AWS

April 12, 2023•
Resource type: Overview
Download PDF

Cloud security with Red Hat Enterprise Linux and AWS

As cloud adoption grows, security continues to be a leading concern for organizations of all sizes. In fact, 85% of organizations cite security as a top cloud challenge.1 This concern is with good reason—45% of breaches in 2022 occurred in the cloud.2 

Consistency is at the core of security and compliance best practices in any environment. To protect your business, you need the same level of security policy and access controls in the cloud that you have on site in your datacenter. Standardizing on an operating foundation that provides consistent security controls across datacenter and cloud environments can help you improve security and compliance across your organization. Using Red Hat® Enterprise Linux® as your operating foundation across your datacenter and Amazon Web Services (AWS) cloud environments helps you create the consistency needed to maintain security and compliance.

Adopt a consistent foundation for security and compliance across AWS and your other environments

The combination of Red Hat Enterprise Linux and AWS delivers integrated, automated security capabilities throughout your infrastructure and software stack, making it simpler to maintain security and compliance across your environments. Security is a key part of both the Red Hat Enterprise Linux and the AWS architectures and life cycles. Built-in operating system security features, security profiles, and compliance with industry and government regulations protect your systems no matter where you deploy them. Best practice-based default settings configure your systems for increased security from the start. Minimized package sets for prebuilt cloud images reduce your cybersecurity threat attack surface. Security upgrades and live patches are also provided as part of your Red Hat Enterprise Linux subscription.

Red Hat and AWS validate all Red Hat Enterprise Linux security profiles to ensure they run as expected on AWS infrastructure. AWS also includes advanced security features and a large number of compliance certifications and accreditations. AWS policies, architecture, and operational processes are built to the stringent requirements of security-sensitive organizations, and protect your information, identities, applications, and devices. Red Hat and AWS also provide security advisories for current issues and can work with you to resolve security problems when needed. 

With Red Hat Enterprise Linux and AWS, you can mitigate security risks, implement and maintain layered security, and streamline compliance across hybrid cloud environments. This overview describes key features and capabilities for adopting a consistent security approach across your datacenter and AWS environments.

Operate consistently across datacenter and cloud environments

Red Hat Enterprise Linux includes many optimizations to ensure reliable, security-focused performance on AWS. It provides a consistent operating foundation for hybrid cloud environments, so you can run applications where it makes the most sense.

Learn about the value of Red Hat Enterprise Linux in the cloud >>

Detect and remediate vulnerabilities at scale with Red Hat Insights

The average time to identify and contain a data breach in 2022 was 277 days.2 Finding and stopping a breach in 200 days or less can reduce its resulting cost by an average of 24%.2 Consistent, daily monitoring can help you identify vulnerability and compliance risks before they interrupt business operations or result in a breach.

Included with Red Hat Enterprise Linux, Red Hat Insights is a suite of hosted services on the Red Hat Hybrid Cloud Console that continuously analyze platforms and applications to help you better manage and optimize your hybrid cloud environments. Red Hat Insights uses predictive analytics and deep domain expertise to identify, assess, and recommend remediation for security and compliance risks, along with other operational risks. It also helps you prioritize remediation actions based on the severity, type of risk, and impact of the change. Red Hat Insights works across on-site and cloud environments, allowing you to manage all of your Red Hat Enterprise Linux systems from a single interface. You can even link your Red Hat account to your AWS account to automatically connect your cloud-based systems and workloads to Red Hat Insights and other Red Hat services when you provision them.

Red Hat Insights includes services that help you protect hybrid cloud environments. The vulnerability service lets you scan your systems for Common Vulnerabilities and Exposures (CVEs), collect scan information, and access remediation guidance that is validated with AWS, using a single interface. And the malware service helps you identify on-site and cloud-based systems that contain active malware signatures quickly to prevent long-term exposure.

AWS also offers innovative security services and solutions that help you prevent, detect, respond, and remediate issues to improve your organization’s security posture.

Ensure compliance with standards certification and built-in scanning and remediation for AWS and Red Hat Enterprise Linux

Noncompliance can result in fines, damage to your business, and loss of certification in addition to security breaches. The average cost of a data breach for organizations with high levels of compliance failures was US$5.57 million in 2022.2 High levels of compliance failures increased the cost of a data breach by US$258,293 on average in 2022.2 

Both Red Hat Enterprise Linux and AWS are certified to stringent government and industry standards, allowing you to use them confidently in highly regulated environments. For example, AWS regularly achieves 3rd-party validation for thousands of global compliance requirements, including Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), FedRAMP, General Data Protection Regulation (GDPR), and Federal Information Processing Standard Publication (FIPS) 140-2.

Additionally, Red Hat Insights includes services that help you more easily maintain compliance in hybrid cloud environments. The policies service lets you define custom security policies, monitor systems for compliance, and alert teams when a system is out of compliance. And the compliance service lets you audit compliance with OpenSCAP policies, remediate systems that are out of compliance, and generate reports for regulatory compliance and security audits. You can also tailor the default policies to your environment and operations to generate more accurate results.

Key built-in policy baselines include:

  • PCI-DSS.
  • Enhanced Operating System Protection Profile (Common Criteria).
  • Australian Cyber Security Centre (ACSC) Essential Eight.
  • Center for Internet Security (CIS) Benchmark.
  • HIPAA.
  • Defense Information Systems Agency Secure Technical Implementation Guidelines (DISA STIG).

Deploy consistent, hardened images across AWS and other environments with the Red Hat image builder 

72% of organizations have a hybrid cloud strategy in place today.1 While this approach lets you choose the right infrastructure for each workload, it also creates complexity and increases your risk of inconsistencies that can lead to security and compliance issues.

The Red Hat Enterprise Linux image builder service helps you create, manage, and deploy Red Hat Enterprise Linux operating system images across hybrid cloud environments more quickly and easily. You can build customized, security-hardened images, save them as templates, and push them to your AWS inventory to simplify provisioning. As a result, you can be sure that your systems are configured consistently across your datacenter and AWS environments.

Verify system integrity across environments with remote attestation

Ensuring system integrity is essential in large-scale, highly distributed environments. Untrusted and compromised systems can leave your organization vulnerable to attack by malicious actors.

Red Hat Enterprise Linux includes remote attestation capabilities for verifying the state of systems at boot and continuously monitoring the integrity of remote systems. Based on the Keylime open source project, remote attestation uses embedded Trusted Platform Module (TPM) hardware and the Linux kernel Integrity Measurement Architecture (IMA) to monitor systems at scale. You can also send encrypted files to the monitored systems and specify automated actions that are performed whenever a monitored system fails the integrity test.

Protect your data in the cloud with advanced encryption capabilities

Your data is a key asset for your business, and protecting it in the cloud is critical.

Red Hat Enterprise Linux includes support for network-bound disk encryption (NBDE) to simplify the protection of data at rest. NBDE automatically unlocks storage volumes via connections to one or more network servers or TPMs. This allows you to decrypt volumes without manually managing encryption keys and ensures that volumes are only available when they are secured.

AWS provides detailed data management capabilities, allowing you to encrypt, move, and administer your data according to your organization’s requirements in addition to regional and local data privacy laws. All data flowing across the AWS global network between AWS datacenters and regions is automatically encrypted at the physical layer. AWS also provides additional layers of encryption for all virtual private cloud (VPC) cross-region peering traffic, transport-layer security (TLS) connections, and more.

Zero trust architectures with built-in identity and access management

Traditional perimeter-based security approaches cannot effectively protect new, widely distributed, cloud-based environments. Zero trust architectures can help by applying security to each asset, rather than exclusively at a network perimeter. In fact, implementing zero trust reduces the cost of data breaches by 20.5% on average.2 Identity and access management (IAM) is at the core of zero trust architectures.

Red Hat Enterprise Linux and AWS offer identity management tools and services to help you centralize identity management, enforce security controls, and comply with security standards across your entire environment. These tools and services deliver the capabilities needed to implement zero trust best practices while simplifying your identity management infrastructure. Authenticate users and implement policy-based or role-based access controls (RBAC). These tools and services integrate with Microsoft Active Directory, lightweight directory access protocol (LDAP), and other 3rd-party solutions through standard interfaces. They also support certificate-based authentication and authorization techniques.

Speed security and compliance operations

Red Hat Insights helps you accelerate security and compliance operations:

  • 91% less time to detect security vulnerabilities3
  • 69% less time to detect policy violations3

Learn more about managing security and compliance with Red Hat Enterprise Linux:

Manage security risks with Red Hat Insights brief

Resolving issues with Red Hat Insights demo

Using OpenSCAP for security compliance and vulnerability scanning live demo

Streamline security configuration and management with system roles

As the size and complexity of your infrastructure grows, it becomes harder to manage manually. Cloud misconfigurations were the initial attack vector for 15% of data breaches, resulting in an average cost per breach of US$4.14 million in 2022.2 Automation can help you configure and manage your systems faster, more consistently, and with less effort.

Red Hat Enterprise Linux system roles—powered by Red Hat Ansible® Automation Platform—use automation to help you install and manage security settings at scale in less time. System roles work with multiple Red Hat Enterprise Linux releases across datacenter and AWS cloud infrastructure, so you can configure new security settings and maintain them on all your systems with a single command or workflow. AWS also lets you automate manual security tasks to speed response times and reduce risk due to human errors. 

Learn more

A consistent approach to security and compliance across hybrid cloud environments can help you better protect your organization. Running Red Hat Enterprise Linux via AWS gives you a security-focused foundation for running applications in your datacenter and in the cloud.

  • See how Red Hat and AWS partner to simplify hybrid cloud adoption >>
  • Explore cloud providers and options for Red Hat Enterprise Linux in the hybrid cloud >>
  1. Flexera. “Flexera 2022 State of the Cloud Report,” March 2022.

  2. IBM Security. “Cost of a Data Breach Report 2022,” 2022.

  3. Principled Technologies, sponsored by Red Hat. “Save administrator time and effort by activating Red Hat Insights to automate monitoring,” September 2020.

Build a foundation for zero trust in Linux environments

A zero trust architecture can help you better protect your IT environment and organization.

  • Learn how to implement zero trust with Red Hat Enterprise Linux >>
  • Watch a demo of user management in Red Hat Enterprise Linux >>

Tags:Hybrid cloud, Linux

Red Hat logoLinkedInYouTubeFacebookX

Products & portfolios

  • Red Hat AI
  • Red Hat Enterprise Linux
  • Red Hat OpenShift
  • Red Hat Ansible Automation Platform
  • Cloud services
  • See all products

Tools

  • Training and certification
  • My account
  • Customer support
  • Developer resources
  • Find a partner
  • Red Hat Ecosystem Catalog
  • Documentation

Try, buy, & sell

  • Product trial center
  • Red Hat Store
  • Buy online (Japan)
  • Console

Communicate

  • Contact sales
  • Contact customer service
  • Contact training
  • Social

About Red Hat

Red Hat is an open hybrid cloud technology leader, delivering a consistent, comprehensive foundation for transformative IT and artificial intelligence (AI) applications in the enterprise. As a trusted adviser to the Fortune 500, Red Hat offers cloud, developer, Linux, automation, and application platform technologies, as well as award-winning services.

  • Our company
  • How we work
  • Customer success stories
  • Analyst relations
  • Newsroom
  • Open source commitments
  • Our social impact
  • Jobs

Select a language

  • 简体中文
  • English
  • Français
  • Deutsch
  • Italiano
  • 日本語
  • 한국어
  • Português
  • Español

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility