Ce contenu n'est pas disponible dans la langue sélectionnée.

Chapter 1. Overview of Red Hat Trusted Profile Analyzer


Red Hat Trusted Profile Analyzer (RHTPA) is a product within the Red Hat Trusted Software Supply Chain suite that helps organizations manage their software supply chain security and risk management. It empowers the DevSecOps teams to assess risk profiles across custom, third-party, and open source software components without slowing down development or increasing operational complexity. The Trusted Profile Analyzer service gives you a centralized, unified view of your application’s security profile, also called a Single Pane of Glass (SPOG) view. This SPOG view is powered by underlying RESTful application programming interfaces (APIs) and provides the basis for the RHTPA web console and notification services.

Exhort is the backend endpoint of Trusted Profile Analyzer where all the API requests get sent, to retrieve the necessary data to analyze, including package dependencies and vulnerabilities. The Red Hat Dependency Analytics (RHDA) integrated development environment (IDE) plugin uses this endpoint to generate vulnerability reports within the IDE framework.

The Trusted Profile Analyzer service operates by aggregating, managing, and analyzing the following critical security documentation:

  • Software Bill of Materials (SBOMs): It stores, indexes, and queries SBOMs for all your custom, third-party, and open source software components, creating a shared system of record. It supports formats like CycloneDX and SPDX.
  • Vulnerability Exploitability eXchange (VEX) : It is a security advisory issued by a software provider for specific vulnerabilities within a product.
  • Common Vulnerabilities and Exposures (CVE) : It indicates a product’s exposure to attacks and malicious activities by giving it a score between 1 to 10, where 1 is the lowest exposure level and 10 is the highest exposure level.

The Trusted Profile Analyzer service can regularly import advisory and vulnerability data, and uses this data to cross-references data from SBOM documents. This can help teams interpret the potential impact based on metrics such as the Common Vulnerability Scoring System (CVSS), a standardized, open framework for scoring IT vulnerabilities, and helps them to prioritize and manage remediation efforts.

Retour au début
Red Hat logoGithubredditYoutubeTwitter

Apprendre

Essayez, achetez et vendez

Communautés

À propos de la documentation Red Hat

Nous aidons les utilisateurs de Red Hat à innover et à atteindre leurs objectifs grâce à nos produits et services avec un contenu auquel ils peuvent faire confiance. Découvrez nos récentes mises à jour.

Rendre l’open source plus inclusif

Red Hat s'engage à remplacer le langage problématique dans notre code, notre documentation et nos propriétés Web. Pour plus de détails, consultez le Blog Red Hat.

À propos de Red Hat

Nous proposons des solutions renforcées qui facilitent le travail des entreprises sur plusieurs plates-formes et environnements, du centre de données central à la périphérie du réseau.

Theme

© 2025 Red Hat