Rechercher

Ce contenu n'est pas disponible dans la langue sélectionnée.

Chapter 1. About Red Hat Trusted Application Pipeline

download PDF

Sophisticated applications have complex software supply chains, and the longer a software supply chain is, the more vulnerable it is to attacks of all kinds. Secure every phase of your software development lifecycle with Red Hat Trusted Application Pipeline (RHTAP). RHTAP can build, test, deploy, and monitor your source code with secure CI/CD, and its comprehensive set of security tools protects your complete software supply chain.

Key RHTAP features

  • Continuously build, test, and deploy container images from your Git source code to a built-in development environment.
  • Ready-to-use templates to start learning and customizing right away.
  • Build Java, Python, Node, Go, or npm-based apps into container images.
  • Access to Red Hat Developer Hub as your self-serve developer portal.
  • Generate, check, and manage your software bill of materials (SBOM).
  • Cryptographically sign and attest container image provenance with Tekton chains.
  • Verify container image SLSA compliance up to level 3, against more than 40 rules.
  • Vulnerabilities scanning with each merge request to identify and address any security threats at the earliest stage possible.

Who’s the target user?

If you’re a platform engineer, application developer, or security team member, you’re in the right place. In Red Hat Trusted Application Pipeline, you’ll find everything you need to install, configure, and customize the internal developer portal to secure your software supply chain across the development lifecycle.

How does it work?

Red Hat Trusted Application Pipeline (RHTAP) empowers you to streamline and secure your entire DevSecOps CI/CD process.

Secure development from the onset

Once RHTAP is installed and configured, access pre-built, secure templates within Red Hat Developer Hub. Simply select the appropriate ready-to-use software template, fill in the necessary details, and create a new application. This creates a dedicated development environment that includes everything you need: a code repository (source code and GitOps repositories), technical documentation, and a continuous integration/continuous delivery (CI/CD) pipeline.

Security scans throughout the development lifecycle

Editing the source code triggers a pipeline run within your application. This pipeline ensures every build artifact is signed and attested for authenticity. It also scans for vulnerabilities in your code and automatically generates Software Bills of Materials (SBOMs). These SBOMs detail all components, libraries, and dependencies included in the container image, providing complete transparency into your application’s makeup.

Review, Refine, and Release

The pipeline presents any identified vulnerabilities for your review and remediation. You can also review the SBOM to gain a deeper understanding of your application’s components. Depending on your promotional workflow, you might advance your application through development, staging, and finally to production. Each promotion triggers another pipeline run, scanning for vulnerabilities and enforcing your Enterprise Contract (EC). The EC ensures that container images meet predefined quality and security standards before release. Should an image fail to meet these criteria, the EC issues a detailed report identifying the necessary corrections.

This streamlined approach with RHTAP allows developers to focus on innovation while upholding the highest security standards throughout the development lifecycle.

To better understand how RHTAP works, take a look at the following descriptive list of the various components and technologies that support and are supported by RHTAP.

Table 1.1. RHTAP technologies and components
Components and technologiesDescription

Red Hat Developer Hub

RHDH gives you access to countless resources and tools for secure software development, so getting started with RHTAP is streamlined and straightforward. RHDH encourages best practices and facilitates the integration of security measures from the very start of your development process.

Red Hat Trusted Artifact Signer

RHTAS enhances software integrity by making sure every piece of your code and all of your artifacts are signed and attested. RHTAS provides a verifiable trust chain to confirm that all of your software components are safeguarded and authentic.

Red Hat Trusted Profile Analyzer

RHTPA automates the creation of your software bill of materials (SBOM). SBOMs are critical for maintaining software supply chain transparency and compliance because they provide a detailed list of all components, libraries, and dependencies included in a software product. When you use RHTPA to generate and manage your SBOM, you’re making sure that all of your stakeholders have accurate and current information about the composition of your software.

OpenShift

RHTAP uses an OpenShift Container Platform (OCP) cluster for compute resources. OCP also includes a console, which offers various services to standardize workflows and make it easier to securely manage the entire development lifecycle.

GitHub

RHTAP automatically starts a build according to the pipeline definition in your pull request (PR). You can also view PR test feedback according to the checks API, and after successful tests, you can set up your PRs to automerge.

Argo CD

Argo CD from GitOps declares and controls versions of your app definitions, configurations, and environments, and automates and tracks app deployment and lifecycle management.

Tekton build pipeline

When you build with RHTAP, you store a complete Tekton build pipeline in your repository.

Tekton Chains

RHTAP can use Tekton Chains to produce a signed build pipeline attestation.

Additional resources

Red Hat logoGithubRedditYoutubeTwitter

Apprendre

Essayez, achetez et vendez

Communautés

À propos de la documentation Red Hat

Nous aidons les utilisateurs de Red Hat à innover et à atteindre leurs objectifs grâce à nos produits et services avec un contenu auquel ils peuvent faire confiance.

Rendre l’open source plus inclusif

Red Hat s'engage à remplacer le langage problématique dans notre code, notre documentation et nos propriétés Web. Pour plus de détails, consultez leBlog Red Hat.

À propos de Red Hat

Nous proposons des solutions renforcées qui facilitent le travail des entreprises sur plusieurs plates-formes et environnements, du centre de données central à la périphérie du réseau.

© 2024 Red Hat, Inc.