Accreditations¶
We have an accreditation system for product assurance. Where ever you see one of our badges, you can be sure the following principles have been applied.
Well Engineered¶

Well-engineered operating system is one that applies sound software-and-systems-engineering principles throughout its design, implementation, testing and maintenance phases. In practice, that means it exhibits most or all of the following qualities:
- Modularity and Abstraction
Cleanly separated components (kernel, device drivers, file systems, network stack, user-space services)
Well-defined interfaces and APIs so that one module can be changed or replaced with minimal impact on others
Layered design (e.g. hardware abstraction layer, core kernel, system libraries, user processes)
- Efficiency and Performance
Low overhead in context-switching, interrupt handling and system calls
Scalable scheduling and memory‐management algorithms that behave well from embedded devices up to many-core servers
Optimized I/O and filesystem implementations to maximize throughput and minimize latency
- Reliability and Robustness
Thorough error-checking and graceful failure modes (e.g. journaling file systems, memory‐leak detection)
Fault isolation so that bugs or crashes in one part (for example, a buggy driver) don’t bring down the entire system
Watchdogs, health checks and recovery mechanisms (auto‐reboot, process supervisors)
- Security and Isolation
Principle of least privilege and mandatory access controls (e.g. SELinux)
Strong boundaries between user and kernel space, and between untrusted and trusted components
Audit logging, authentication frameworks and defences against common attacks (buffer overflows, race conditions, side-channels)
- Portability and Hardware Independence
Abstracted hardware interfaces so the same OS core can run on different CPU architectures and platforms
Use of a hardware‐abstraction layer or bus architecture (e.g. PCI, ARM device trees)
Conditional compilation & hardware‐specific modules kept out of the core logic
- Maintainability and Code Quality
Readable, well‐documented source code following consistent style guidelines
Automated test suites (unit, integration, regression, stress tests) and continuous integration pipelines
Effective use of version control, code reviews, issue tracking and release engineering
- Extensibility and Configurability
Support for dynamically loadable modules (drivers, filesystems, network protocols)
Clear configuration mechanisms (compile-time options, run-time tunables, package management)
Stable APIs/ABIs to allow third-party extensions without breaking existing software
- Usability and Ecosystem
Straightforward installation, upgrade paths and rollback mechanisms
Consistent user-space tools and documentation (man-pages, tutorials, online resources)
A rich ecosystem of applications, libraries and developer communities
- Real-Time and Special-Purpose Capabilities (when needed)
Deterministic scheduling and bounded-latency interrupt handling for real-time use cases
Resource reservations or priority inheritance to meet stringent timing requirements
- Measured Engineering Processes
Formal or semi-formal methods for specification and verification where appropriate
Periodic design reviews, post-mortems on failures, and continual performance/security auditing
Roadmaps and lifecycle planning for long-term support and deprecation
In short, a “well-engineered” operating system is more than just “it works.” It embodies rigorous design, careful implementation, comprehensive testing and ongoing maintenance, all aimed at delivering reliable, secure, efficient and maintainable system software across a broad range of use cases.
Well Architected¶

Well-Architected usually refers to the AWS Well-Architected Framework, which codifies best practices for designing and operating cloud workloads. The six pillars are:
- Operational Excellence
How you run and monitor systems to deliver business value
Key practices: change management, incident response, learning from failures
- Security
Protect data, systems, and assets
Key practices: identity and access management, detective controls, infrastructure protection, data encryption
- Reliability
Ensure a workload recovers from failures and meets demand
Key practices: fault isolation, automated recovery, capacity planning
- Performance Efficiency
Use IT and computing resources efficiently
Key practices: selecting the right resource types and sizes, monitoring performance, trade-off analysis
- Cost Optimization
Avoid unnecessary costs
Key practices: controlling where money is spent, selecting cost-effective resources, scaling to meet actual demand
- Sustainability
Minimize environmental impact of running cloud workloads
Key practices: measuring and reducing energy consumption, optimizing resource utilization, considering carbon footprint in design
Applying these pillars helps you build systems that are resilient, secure, efficient, cost-effective and environmentally responsible.
Well Secured¶

Well-secured virtual machine (VM) is one that has been configured, hardened, monitored and maintained so as to minimize its attack surface, protect its data and ensure its integrity, confidentiality and availability. In practical terms, a well-secured VM typically exhibits the following characteristics:
- Hardened Operating System and Applications
Started from a vetted, up-to-date golden image or template (e.g. a CIS- or vendor-approved baseline)
Unnecessary services, packages and daemons disabled or uninstalled
Default accounts removed or renamed; strong passwords or key-based login enforced
File system permissions tightened; unnecessary ports closed
- Timely Patching and Vulnerability Management
Automated patch management in place for OS, hypervisor tools and applications
Regular vulnerability scans (e.g. with Qualys, Nessus) and prompt remediation
Third-party software and libraries kept up to date
- Strong Access Controls and Authentication
Role-based access control (RBAC) or least-privilege IAM policies for administrators and users
Multi-factor authentication (MFA) enforced for console or SSH/RDP logins
SSH key-only access (no password SSH) or certificate-based RDP where possible
Just-in-time (JIT) or time-limited access tokens for emergency troubleshooting
- Network Segmentation and Traffic Filtering
Placement behind virtual firewalls or security groups that restrict inbound/outbound traffic to only what’s needed
Micro-segmentation between tiers (web, app, database) so a compromise in one VM can’t reach others
Network intrusion detection/prevention (IDS/IPS) monitoring east-west and north-south traffic
- Encryption and Data Protection
Disk-at-rest encryption (e.g. LUKS, BitLocker, cloud-provider volume encryption)
Encryption of data in transit (TLS, IPSec VPNs) between VMs and clients or other services
Secure key management (hardware security modules or vault services, not embedding keys in VM images)
- Monitoring, Logging and Alerting
Centralized logging (e.g. syslog, cloud logging services) of system events, authentication attempts and application logs
Real-time alerting on suspicious behaviour (multiple failed logins, unexpected process launches, abnormal network connections)
Endpoint detection and response (EDR) or host-based intrusion detection (HIDS) agents installed
- Minimal Attack Surface and Immutable Infrastructure
Infrastructure-as-Code (IaC) or templates used so every VM is built identically and reproducibly
Immutable VMs that are discarded and rebuilt rather than manually patched in production wherever practical
- Hypervisor and Host Security
Hypervisor patched and configured according to vendor hardening guides
Management plane (API endpoints, consoles) network-isolated and MFA-protected
Hardware virtualisation features (e.g. Intel VT-x, AMD-V, TPM) enabled to reduce risk of VM-escape attacks
- Backup, Recovery and Resilience
Regular, tested backups of VM images and data; off-site or cross-region copies
Disaster recovery (DR) plans in place, with automated failover if possible
Immutable snapshots or WORM (write-once, read-many) storage for critical data
- Compliance and Continuous Improvement
Alignment with relevant security frameworks (CIS Benchmarks, NIST, ISO 27001, PCI DSS, HIPAA, etc.)
Periodic third-party or red-team penetration testing to validate security posture
Continuous review of logs, metrics and threat intelligence to update defences
By covering all these layers—host, hypervisor, guest OS, network, data and operations — a virtual machine can be considered “well-secured.” The exact controls you deploy will depend on your organization’s risk profile, regulatory requirements and business needs, but the core principles (least privilege, defense in depth, automation and monitoring) remain the same.