Red Hat Trusted Software Supply Chain

Consistently code, build, and monitor for a trusted software supply chain across any environment, for faster time to value with automated security guardrails. Try out this service preview.

Red Hat Trusted Application Pipeline Red Hat Trusted Content

Security SupplyChain Header graphic

Code with integrated application security checks

More than two-thirds of application code is inherited from open source dependencies. Leverage Red Hat’s open source security expertise in application code. Add Red Hat Trusted Content (in service preview) of curated builds and hardened open source libraries that’s been verified and attested with provenance checks. Remove malicious code with pro-active vulnerability analysis, notification, and remediation with out-of-the-box plug-ins to your IDE. Crypto sign and certify your code before pushing into commit, using an open, transparent ledger that logs all your submissions.

redhat trusted security supply chain - code

Build with security-focused CI/CD workflows

Building security into container images is an integral part of the software supply chain for cloud-native applications. Red Hat Trusted Application Pipeline (in service preview) provides default pipeline definitions and automated security checks to generate Supply chain Levels for Software Artifacts (SLSA) Level 3 build images from application code across a variety of programming languages. The build includes creating an attested, immutable Software Bill of Materials (SBOM) that automatically creates a chain of trust for your open source components and transitive dependencies.

redhat ssc - build

Deploy continuously with release policies as-code

SLSA Level 3 and higher requires a security-focused release workflow to deploy container images with Red Hat OpenShift GitOps to their respective cloud platforms. The deployments can be to a variety of Kubernetes clusters, including Red Hat OpenShift clusters providing consistency across development, testing, staging and production. Take advantage of Pipeline-as-Code capabilities to customize the default pipeline configuration with Red Hat OpenShift Pipelines. Policy-as-code that covers from integration tests to a customizable Enterprise contract, deployment and releases for the software development lifecycle can be configured to prevent suspicious build activity from being promoted. GitOps principles that serve as a single source of truth that drives the entire release workflow, stored and managed from various types of Git repositories.

Deploy

Monitor and identify runtime security incidents

Capitalize the unified experience to monitor the health and security of the containerized applications that are deployed across multiple cloud platforms. With the integration of Red Hat Advanced Cluster Security Cloud Service (limited availability), security issues in the deployed containers and the Kubernetes runtime environment can be easily detected and remedied. Continuously monitor the behavior of software components and dependencies to observe the impact of risk profile changes made. Instantly detect and alert on security issues early before your users do, using analytics-driven insights that directs with in-context troubleshooting. Prioritize and drill down on alerts by severity to reduce alert fatigue. Existing build images stored and shared in registries also need to be constantly scanned for new, emerging threats each day. Identify and mitigate security risks well before running the image with Red Hat Quay.

redhat ssc - monitor

Red Hat Trusted Software Supply Chain

Start securing software components and dependencies early in your software development lifecycle.

Cut down malicious code, no more poisoned pipelines. Sign-up for a service preview.

Red Hat Trusted Application Pipeline Red Hat Trusted Content

Red Hat named a Challenger in the 2023 Gartner® Magic Quadrant™

Red Hat was positioned in the Challenger Quadrant of the 2023 Gartner® Magic Quadrant™ for DevOps Platforms