Ce contenu n'est pas disponible dans la langue sélectionnée.

Chapter 1. What is RHTAP?


RHTAP is not just a secure CI/CD platform—it’s a transformative solution that enhances cybersecurity practices across your entire software development lifecycle (SDLC). By integrating security measures from inception to deployment, RHTAP accelerates developer onboarding, streamlines processes, and fortifies your applications against emerging threats.

1.1. Key Features

  • Continuous Integration and Delivery (CI/CD): Automatically build, test, and deploy container images from your Git source code within a secure development environment.
  • Ready-to-Use Templates: Kickstart your projects with pre-built, secure templates that you can customize, accelerating your time to production.
  • Versatile Build Support: Build applications in popular languages like Java, Python, Node.js, Go, or npm into secure container images.
  • Developer Portal Access: Utilize Red Hat Developer Hub as your self-service portal, streamlining development and integrating security best practices from the outset.
  • Advanced Security Scanning: Identify vulnerabilities with each merge request, generate detailed Software Bills of Materials (SBOMs), and verify container image compliance against rigorous security standards.

Who Should Use RHTAP?

RHTAP is tailored for platform engineers, application developers, and security teams seeking a robust, secure solution for managing software supply chains. Whether setting up a new internal developer portal or enhancing existing CI/CD processes, RHTAP offers the tools and flexibility your organization needs to thrive.

How Does RHTAP Work?

RHTAP empowers organizations to secure and streamline their DevSecOps CI/CD workflows with a comprehensive suite of tools:

1.2. Secure Development from the Start

Once RHTAP is deployed, developers can access pre-built, secure templates within Red Hat Developer Hub, simplifying the creation of new applications. These templates provide a fully equipped environment, including a code repository, technical documentation, and a CI/CD pipeline.

1.3. Ongoing Security Throughout the Development Lifecycle

Every time source code is modified, RHTAP triggers a pipeline run that signs and attests each build artifact. The pipeline also performs rigorous vulnerability scans and automatically generates SBOMs, offering full transparency into your application’s components.

1.4. Review, Refine, and Release

As your application advances through various stages—development, staging, and production—RHTAP continuously enforces security standards through your Enterprise Contract (EC). This ensures that only container images meeting predefined quality and security criteria are released, with detailed reports guiding any necessary corrections.

Red Hat logoGithubredditYoutubeTwitter

Apprendre

Essayez, achetez et vendez

Communautés

À propos de la documentation Red Hat

Nous aidons les utilisateurs de Red Hat à innover et à atteindre leurs objectifs grâce à nos produits et services avec un contenu auquel ils peuvent faire confiance. Découvrez nos récentes mises à jour.

Rendre l’open source plus inclusif

Red Hat s'engage à remplacer le langage problématique dans notre code, notre documentation et nos propriétés Web. Pour plus de détails, consultez le Blog Red Hat.

À propos de Red Hat

Nous proposons des solutions renforcées qui facilitent le travail des entreprises sur plusieurs plates-formes et environnements, du centre de données central à la périphérie du réseau.

Theme

© 2026 Red Hat
Retour au début