Chapter 3. Key Security Practices
RHTAP incorporates advanced security measures to protect your software supply chain:
- Vulnerability Scanning: Each pull request undergoes thorough scans to detect and address potential security threats early in the development process.
- SBOM Generation: Automated SBOM generation provides a comprehensive inventory of software components, ensuring transparency and compliance.
- Container Image Security: Verifies container images comply with SLSA (Supply-chain Levels for Software Artifacts) guidelines, enforced by an Enterprise Contract with comprehensive security rules.