Chapter 1. Overview of Red Hat Trusted Profile Analyzer
Red Hat Trusted Profile Analyzer (RHTPA) is a product within the Red Hat Trusted Software Supply Chain suite that helps organizations manage their software supply chain security and risk management. It empowers the DevSecOps teams to assess risk profiles across custom, third-party, and open source software components without slowing down development or increasing operational complexity. The Trusted Profile Analyzer service gives you a centralized, unified view of your application’s security profile, also called a Single Pane of Glass (SPOG) view. This SPOG view is powered by underlying RESTful application programming interfaces (APIs) and provides the basis for the RHTPA web console and notification services.
Exhort is the backend endpoint of Trusted Profile Analyzer where all the API requests get sent, to retrieve the necessary data to analyze, including package dependencies and vulnerabilities. The Red Hat Dependency Analytics (RHDA) integrated development environment (IDE) plugin uses this endpoint to generate vulnerability reports within the IDE framework.
The Trusted Profile Analyzer service operates by aggregating, managing, and analyzing the following critical security documentation:
- Software Bill of Materials (SBOMs): It stores, indexes, and queries SBOMs for all your custom, third-party, and open source software components, creating a shared system of record. It supports formats like CycloneDX and SPDX.
- Vulnerability Exploitability eXchange (VEX) : It is a security advisory issued by a software provider for specific vulnerabilities within a product.
- Common Vulnerabilities and Exposures (CVE) : It indicates a product’s exposure to attacks and malicious activities by giving it a score between 1 to 10, where 1 is the lowest exposure level and 10 is the highest exposure level.
The Trusted Profile Analyzer service can regularly import advisory and vulnerability data, and uses this data to cross-references data from SBOM documents. This can help teams interpret the potential impact based on metrics such as the Common Vulnerability Scoring System (CVSS), a standardized, open framework for scoring IT vulnerabilities, and helps them to prioritize and manage remediation efforts.