Chapter 1. Overview


Red Hat Trusted Application Pipeline RHTAP is a DevSecOps framework that integrates security from project inception to production. It reduces security risks in continuous integration/continuous delivery (CI/CD) pipelines by embedding security checks, ensuring artifact integrity, and enabling compliance with standards such as Supply chain Levels for Software Artifacts (SLSA).

1.1. Key features

  • Ready-to-use templates: Start project quickly with customizable templates that include established security practices. Reduce setup time and focus on delivering secure software sooner.
  • Secure CI/CD pipelines: Build, test, and deploy container images securely using pre-configured pipelines integrated with your Git repository. Apply security measures at every stage to reduce risks before code reaches production.
  • Integrated security checks: Detect and address potential vulnerabilities with detailed insights to help understand the potential threats.
  • SBOM management: Automatically generate a Software Bill of Materials (SBOM) for each pipeline. Sign attestations and maintain a clear record of component origins, ensuring traceability and compliance throughout the software life cycle.
  • Tamper-proof artifact signing: Apply cryptographic signatures to code submissions and related artifacts. Maintain an immutable log of build and deployment activities to preserve trust and integrity.
  • Compliance and policy enforcement: Comply with standards such as Supply chain Levels for Software Artifacts (SLSA) Level 3 and enterprise requirements. Configure approval gates, run vulnerability scans, and enforce policies so only verified, compliant artifacts move forward.

1.2. Integrated technologies

RHTAP integrates with industry-leading platforms and tools:

Component or TechnologyDescription

Red Hat Developer Hub (RHDH)

A self-service portal that streamlines development and integrates security best practices from the get-go.

Red Hat Trusted Artifact Signer (RHTAS)

Enhances software integrity through signature and attestation, ensuring all artifacts are secure and authentic.

Red Hat Trusted Profile Analyzer (RHTPA)

Automates the creation and management of SBOMs, providing transparency and compliance in your software supply chain.

Red Hat Advanced Cluster Security (RHACS)

Automates the scanning of artifacts for vulnerabilities.

OpenShift GitOps

Automates application deployment and lifecycle management, ensuring consistent versions of app definitions, configurations, and environments.

OpenShift Pipelines

Automates the CI/CD processes with visibility and control over build, test, and deployment workflows.

1.3. Configuration options

RHTAP allows flexibility in CI/CD management, source repositories, and artifact registries:

CategoryOptions

CI/CD pipelines

  • Tekton (Default)
  • Jenkins
  • GitHub Actions (Technology preview)
  • Gitlab CI
  • Azure CI (Technology preview)
Note

All CI pipelines except Tekton conform to SLSA Build L2. Tekton conforms to Build L3.

Source repositories

  • GitHub (Default)
  • GitLab
  • Bitbucket cloud

Artifact registries

  • Quay (Default)
  • JFrog Artifactory
Back to top
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2025 Red Hat, Inc.