Ce contenu n'est pas disponible dans la langue sélectionnée.
Chapter 1. What is RHTAP?
RHTAP is not just a secure CI/CD platform—it’s a transformative solution that enhances cybersecurity practices across your entire software development lifecycle (SDLC). By integrating security measures from inception to deployment, RHTAP accelerates developer onboarding, streamlines processes, and fortifies your applications against emerging threats.
1.1. Key Features Copier lienLien copié sur presse-papiers!
- Continuous Integration and Delivery (CI/CD): Automatically build, test, and deploy container images from your Git source code within a secure development environment.
- Ready-to-Use Templates: Kickstart your projects with pre-built, secure templates that you can customize, accelerating your time to production.
- Versatile Build Support: Build applications in popular languages like Java, Python, Node.js, Go, or npm into secure container images.
- Developer Portal Access: Utilize Red Hat Developer Hub as your self-service portal, streamlining development and integrating security best practices from the outset.
- Advanced Security Scanning: Identify vulnerabilities with each merge request, generate detailed Software Bills of Materials (SBOMs), and verify container image compliance against rigorous security standards.
Who Should Use RHTAP?
RHTAP is tailored for platform engineers, application developers, and security teams seeking a robust, secure solution for managing software supply chains. Whether setting up a new internal developer portal or enhancing existing CI/CD processes, RHTAP offers the tools and flexibility your organization needs to thrive.
How Does RHTAP Work?
RHTAP empowers organizations to secure and streamline their DevSecOps CI/CD workflows with a comprehensive suite of tools:
1.2. Secure Development from the Start Copier lienLien copié sur presse-papiers!
Once RHTAP is deployed, developers can access pre-built, secure templates within Red Hat Developer Hub, simplifying the creation of new applications. These templates provide a fully equipped environment, including a code repository, technical documentation, and a CI/CD pipeline.
1.3. Ongoing Security Throughout the Development Lifecycle Copier lienLien copié sur presse-papiers!
Every time source code is modified, RHTAP triggers a pipeline run that signs and attests each build artifact. The pipeline also performs rigorous vulnerability scans and automatically generates SBOMs, offering full transparency into your application’s components.
1.4. Review, Refine, and Release Copier lienLien copié sur presse-papiers!
As your application advances through various stages—development, staging, and production—RHTAP continuously enforces security standards through your Enterprise Contract (EC). This ensures that only container images meeting predefined quality and security criteria are released, with detailed reports guiding any necessary corrections.