Overview
This is a repackaged software product wherein additional charges apply for hardening, security configuration, and support.
WHAT IS VAULTWARDEN
Vaultwarden is an unofficial, lightweight, open-source implementation of the Bitwarden server API, written in Rust. It is fully compatible with the official Bitwarden clients - desktop apps for Windows, macOS and Linux, mobile apps for iOS and Android, and browser extensions for all major browsers.
Vaultwarden runs on a single instance with minimal resources, uses SQLite by default, and supports the full Bitwarden feature set: organizations, shared collections, TOTP authenticator, hardware security keys (FIDO2/WebAuthn), emergency access, and the Send feature.
WHY SELF-HOST YOUR PASSWORD VAULT
Passwords are your most sensitive credentials. Storing them with a cloud provider means trusting that provider's security posture, uptime, and business continuity - and paying growing per-user fees as your team scales.
Self-hosted Vaultwarden keeps your password vault entirely within your own infrastructure. Your credentials never leave your VPC. You control backups, retention, and access policies. For GDPR-regulated organizations and teams with strict data residency requirements, self-hosting is the only fully compliant option.
ENHANCED SECURITY OUT OF THE BOX
A production-ready Vaultwarden deployment requires HTTPS, a unique admin token, database access controls, and a hardened OS - steps that are easy to skip and hard to audit after the fact.
This AMI pre-configures all of these for you: HTTPS is live at first boot, the admin token is unique to your instance, the database is never exposed to the network, and the underlying OS meets CIS Level 1 from day one.
WHAT THIS AMI ADDS
Security defaults:
- HTTPS enabled at first boot with a self-signed certificate
- Unique admin token generated per instance - no shared or default token
- Certbot pre-installed - replace self-signed cert with Let's Encrypt in one command
- SQLite database accessible from localhost only
- UFW firewall - only ports 80 (Certbot HTTP challenge), 443 (HTTPS), and 22 (SSH) open
OS hardening (CIS Level 1):
- CIS Ubuntu 24.04 LTS Level 1 benchmark applied via ansible-lockdown
- auditd - system call auditing for critical paths
- SSH hardening - PasswordAuthentication disabled, key-only access
- fail2ban - SSH brute-force protection
- AppArmor - mandatory access control
- Kernel hardening - SYN cookies, ASLR, rp_filter, TCP BBR
- IMDSv2 enforced - SSRF protection
Compliance artifacts (inside the AMI):
- SBOM - CycloneDX 1.6 software bill of materials at /etc/lynxroute/sbom.json
- CIS Conformance Report - OpenSCAP HTML report at /etc/lynxroute/cis-report.html
- Tailored CIS profile - documents all applied controls and any deviations at /usr/share/doc/lynxroute/CIS_TAILORED_PROFILE.md
Quick Start:
- Launch instance (t3.small recommended)
- SSH: ssh -i key.pem ubuntu@<PUBLIC_IP>
- Read credentials: sudo cat /root/vaultwarden-credentials.txt
- Open https://<PUBLIC_IP> in your browser and accept the self-signed cert warning
- Register your first account at https://<PUBLIC_IP>/#/register
- Optional - point a domain and get a trusted cert: sudo certbot --nginx -d
Admin panel: https://<PUBLIC_IP>/admin - token from credentials file. Important: never expose port 443 with a self-signed cert to users without a real domain and Let's Encrypt certificate in production.
Highlights
- Vaultwarden secure by default: HTTPS with self-signed cert, unique admin token per instance, Certbot pre-installed for Let's Encrypt - password vault access over plain HTTP is disabled out of the box.
- CIS Level 1 hardened Ubuntu 24.04 LTS base: auditd, fail2ban, AppArmor, SSH key-only, IMDSv2 enforced, SBOM and CIS Conformance Report included for compliance teams.
- Full Bitwarden client compatibility: all official Bitwarden apps on desktop, mobile, and browser work with this Vaultwarden server - no client changes, no code changes, no per-user SaaS fees.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Cost/hour |
|---|---|
t3.small Recommended | $0.07 |
t3.micro | $0.05 |
t3.large | $0.12 |
t3.medium | $0.10 |
m6i.large | $0.12 |
Vendor refund policy
We do not offer refunds for this product. AWS infrastructure charges (EC2, EBS, data transfer) are billed separately by AWS and are not refundable by us. If you experience technical issues with the AMI, please contact us at support@lynxroute.com before requesting a refund.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Version 1.35.7 - Initial release (April 2026)
- Vaultwarden 1.35.7 on Ubuntu 24.04 LTS
- CIS Level 1 hardening applied (ansible-lockdown/UBUNTU24-CIS)
- HTTPS enabled at first boot with self-signed certificate
- Unique admin token generated per instance - no shared default token
- Certbot pre-installed for Let's Encrypt SSL automation
- SQLite database with localhost-only access
- UFW firewall pre-configured (ports 80, 443, 22 only)
- fail2ban, auditd, AppArmor pre-configured
- SBOM (CycloneDX 1.6) at /etc/lynxroute/sbom.json
- CIS Conformance Report (OpenSCAP) at /etc/lynxroute/cis-report.html
- Tailored CIS profile with documented controls at /usr/share/doc/lynxroute/CIS_TAILORED_PROFILE.md
- IMDSv2 enforced
Additional details
Usage instructions
- Launch instance (t3.small recommended)
- SSH: ssh -i key.pem ubuntu@<PUBLIC_IP>
- Read credentials: sudo cat /root/vaultwarden-credentials.txt
- Open https://<PUBLIC_IP> in your browser and accept the self-signed cert warning
- Register your first account at https://<PUBLIC_IP>/#/register
- Optional - point a domain and get a trusted cert: sudo certbot --nginx -d <your-domain>
Admin panel: https://<PUBLIC_IP>/admin - token from credentials file. Important: never expose port 443 with a self-signed cert to users without a real domain and Let's Encrypt certificate in production.
Resources
Vendor resources
Support
Vendor support
Visit us online
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.