Speaking of challenges I faced with Amazon Linux, some other use cases I used it for include building containers that I take and store in my Amazon ECR, and the main challenge I usually faced was vendor lock-in, as the design is mainly for AWS. It has limited optimization and support outside AWS, and for us to migrate loads to another cloud, it requires many changes. The community support is also limited because it is smaller compared to Ubuntu or Debian, and there are fewer third-party tutorials and troubleshooting guides for Amazon Linux, so we must heavily rely on AWS documentation. It is still a great tool but has a learning curve and cannot really be compared to other Linux distributions. Although I am a DevOps engineer and do not have specific metrics readily available, I am aware that patch deployment time is notably efficient, as critical patches are usually applied within less than 48 hours from release. For unpatched common vulnerability exposures, the instances of these were near zero for high or critical CVEs. This assures efficiency and reveals that we did not experience many security incidents due to unpatched systems, although I do not have specific figures for that. Personally, from my own experience with Amazon Linux, I can suggest improving the patch compliance rate by automating patching using the systems manager patch, scheduling automatic patch windows, and enforcing patch baselines to achieve higher compliance and fewer missed systems. Standardizing operating system images by using golden AMIs with the latest images could also help, as new systems are built by default while removing unused software would be beneficial. Further improvements needed for Amazon Linux include ensuring compatibility beyond AWS, which would be very useful, as well as enhancing GUI support since it is primarily focused on server workloads. A better graphical user interface based on admin tools would be great, and providing more frequent runtime updates for languages such as Python, Node.js, and Java, which currently lag behind in their latest releases, would also be beneficial. Additionally, improving monitoring and reporting features while integrating patch and security dashboards would be useful.