Skip to main content
Redhat Developers  Logo
  • Products

    Featured

    • Red Hat Enterprise Linux
      Red Hat Enterprise Linux Icon
    • Red Hat OpenShift AI
      Red Hat OpenShift AI
    • Red Hat Enterprise Linux AI
      Linux icon inside of a brain
    • Image mode for Red Hat Enterprise Linux
      RHEL image mode
    • Red Hat OpenShift
      Openshift icon
    • Red Hat Ansible Automation Platform
      Ansible icon
    • Red Hat Developer Hub
      Developer Hub
    • View All Red Hat Products
    • Linux

      • Red Hat Enterprise Linux
      • Image mode for Red Hat Enterprise Linux
      • Red Hat Universal Base Images (UBI)
    • Java runtimes & frameworks

      • JBoss Enterprise Application Platform
      • Red Hat build of OpenJDK
    • Kubernetes

      • Red Hat OpenShift
      • Microsoft Azure Red Hat OpenShift
      • Red Hat OpenShift Virtualization
      • Red Hat OpenShift Lightspeed
    • Integration & App Connectivity

      • Red Hat Build of Apache Camel
      • Red Hat Service Interconnect
      • Red Hat Connectivity Link
    • AI/ML

      • Red Hat OpenShift AI
      • Red Hat Enterprise Linux AI
    • Automation

      • Red Hat Ansible Automation Platform
      • Red Hat Ansible Lightspeed
    • Developer tools

      • Red Hat Trusted Software Supply Chain
      • Podman Desktop
      • Red Hat OpenShift Dev Spaces
    • Developer Sandbox

      Developer Sandbox
      Try Red Hat products and technologies without setup or configuration fees for 30 days with this shared Openshift and Kubernetes cluster.
    • Try at no cost
  • Technologies

    Featured

    • AI/ML
      AI/ML Icon
    • Linux
      Linux Icon
    • Kubernetes
      Cloud icon
    • Automation
      Automation Icon showing arrows moving in a circle around a gear
    • View All Technologies
    • Programming Languages & Frameworks

      • Java
      • Python
      • JavaScript
    • System Design & Architecture

      • Red Hat architecture and design patterns
      • Microservices
      • Event-Driven Architecture
      • Databases
    • Developer Productivity

      • Developer productivity
      • Developer Tools
      • GitOps
    • Secure Development & Architectures

      • Security
      • Secure coding
    • Platform Engineering

      • DevOps
      • DevSecOps
      • Ansible automation for applications and services
    • Automated Data Processing

      • AI/ML
      • Data Science
      • Apache Kafka on Kubernetes
      • View All Technologies
    • Start exploring in the Developer Sandbox for free

      sandbox graphic
      Try Red Hat's products and technologies without setup or configuration.
    • Try at no cost
  • Learn

    Featured

    • Kubernetes & Cloud Native
      Openshift icon
    • Linux
      Rhel icon
    • Automation
      Ansible cloud icon
    • Java
      Java icon
    • AI/ML
      AI/ML Icon
    • View All Learning Resources

    E-Books

    • GitOps Cookbook
    • Podman in Action
    • Kubernetes Operators
    • The Path to GitOps
    • View All E-books

    Cheat Sheets

    • Linux Commands
    • Bash Commands
    • Git
    • systemd Commands
    • View All Cheat Sheets

    Documentation

    • API Catalog
    • Product Documentation
    • Legacy Documentation
    • Red Hat Learning

      Learning image
      Boost your technical skills to expert-level with the help of interactive lessons offered by various Red Hat Learning programs.
    • Explore Red Hat Learning
  • Developer Sandbox

    Developer Sandbox

    • Access Red Hat’s products and technologies without setup or configuration, and start developing quicker than ever before with our new, no-cost sandbox environments.
    • Explore Developer Sandbox

    Featured Developer Sandbox activities

    • Get started with your Developer Sandbox
    • OpenShift virtualization and application modernization using the Developer Sandbox
    • Explore all Developer Sandbox activities

    Ready to start developing apps?

    • Try at no cost
  • Blog
  • Events
  • Videos

Red Hat Trusted Profile Analyzer is now generally available

March 18, 2024
Sean Rickerd
Related topics:
Developer ToolsSecurity
Related products:
Red Hat Trusted Software Supply Chain

Share:

    Red Hat Trusted Profile Analyzer is now generally available, providing actionable insights from your software assets’ security documentation. Help development teams generate and manage software bills of materials (SBOMs) without the operational complexity. Store, index, and query SBOMs from a system of record to find and fix vulnerabilities early. Track software dependencies and understand the impact radius of security issues directly from the IDE, alongside recommended remediation tactics. Improve trust and transparency at code-time to start curating your own trusted content today. 

    Learn more at red.ht/tracked.

    Security around building and deploying applications is more critical than ever. As such, it is also just as important to understand what comprises the applications your developers are building and where they are coming from. The ability to code, build, and monitor your applications through proven platforms, and get artifacts from trusted sources are imperative to building safer and more reliable applications. One of the important aspects of this is the Software Bill of Materials (SBOM).

    What is an SBOM? 

    A Software Bill of Materials (SBOM) functions as an inventory with layers, containing a comprehensive collection of software components. This information can be used to ensure the elements used to build an application have verified origins. Information in an SBOM includes the Component Name, Version, License Information, Origin/Source, Dependencies, and a Hash/Checksum.

    A great analogy with this can be made with a restaurant. The base ingredients for a dish can be compared to libraries and other dependencies an application may have. When the chef (Dev) knows where an ingredient came from (origin/source) and when it was picked (version), he can more easily know if the ingredients are spoiled (vulnerable) and avoid using them in his soup (application), protecting the diners (users) and the restaurant (organization) from health code violations (exploits/intrusions/loss of data).

    This information can help lower the risk of a supply chain attack.

    What is a Supply Chain Attack? 

    A supply chain attack is a type of cyberattack that targets the interconnected set of resources and processes involved in producing and distributing a product. Instead of directly attacking the target organization, the attacker focuses on compromising a third-party vendor or service provider within the supply chain. By doing so, the attacker can exploit the trust and access that the compromised supplier has with the target organization.

    Supply chain attacks can take various forms, and often involve malicious code or hardware being inserted into the products or services being supplied. These attacks could include malware embedded in software updates, malicious components added to hardware, or other methods to compromise the integrity of the supply chain.

    One example of such an attack came to light in December 2020. The attackers injected a malicious backdoor, known as Sunburst, into the software updates of a widely used computer network management and monitoring platform. The primary targets of the Sunburst attack were the platform's customers, which included numerous government agencies and large corporations. The attackers gained unauthorized access to the networks of these organizations by exploiting the trust in the compromised software's updates. This attack had a significant impact; however, had SBOMs and Vulnerability Exploitability eXchange (VEX) solutions been in place at this organization, it could have been possible to mitigate the attack as there would have been a way to detect the backdoor within the application's update preemptively.

    In Red Hat's State of Kubernetes security report for 2023, more than half of the respondents indicated that they had experienced a software supply chain issue related to cloud-native and containerized development in the preceding 12 months.
     

    The software supply chain is under real threat, so what can we do about it? 

    Red Hat Trusted Profile Analyzer

    Red Hat has consistently been mindful of security, and as cloud-native technologies become more and more prevalent in the modern world of IT, we continue to focus on making sure we can bring ways for our customers to make their workloads more secure. Using the open-source projects SYFT and GUAC, Trusted Profile Analyzer is designed to enable Red Hat customers to track their software components across the build and deployment of their applications.


    With Red Hat Trusted Profile Analyzer, you can get actionable insights from all your software assets to enable your security professionals to manage applications' risk profile of direct and transitive dependencies, track exploitable vulnerabilities, measure the potential blast radius of threat, and create an incident response framework to avoid security incidents appearing in production workloads. In real-time, your application developers can access transient dependency and vulnerability reports to understand the level of risk on existing source code and solve issues before they happen. They can also access reusable trusted content, helping to reduce vulnerabilities during development and minimize security risks at production.

    Your organizations' DevSecOps and CISOs can more easily meet compliance requirements, have increased confidence when using open source software in production applications, and assess the level of exposure and risk profile for an application. Using trusted content lets developers be productive, increases software transparency, and defines an incident response framework to reduce the risk of security incidents in production workloads.

    Red Hat Trusted Profile Analyzer enables you to gain and take advantage of deeper insights into your applications' security. So we invite you to test it and see how you can boost your app-dev security.

    Learn more about Red Hat Trusted Profile Analyzer here.

    Last updated: May 2, 2024

    Related Posts

    • Red Hat Trusted Software Supply Chain is now available

    • An introduction to Red Hat Trusted Application Pipeline

    • Red Hat Developer Hub: Your gateway to seamless development

    • What enterprise developers need to know about security and compliance

    • 3 steps toward improving container security

    • Kubernetes security risks that keep developers up at night

    Recent Posts

    • Alternatives to creating bootc images from scratch

    • How to update OpenStack Services on OpenShift

    • How to integrate vLLM inference into your macOS and iOS apps

    • How Insights events enhance system life cycle management

    • Meet the Red Hat Node.js team at PowerUP 2025

    What’s up next?

    E-book: A developer’s guide to setting supply chain security in DevSecOps

    This short guide provides a developer's introduction to software supply chain security, including the key principles, tools, and techniques you need to know to better audit and act on vulnerabilities in open source software components. Start integrating security guardrails across your software development life cycles to catch security issues early.

    Get the e-book
    Red Hat Developers logo LinkedIn YouTube Twitter Facebook

    Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform

    Build

    • Developer Sandbox
    • Developer Tools
    • Interactive Tutorials
    • API Catalog

    Quicklinks

    • Learning Resources
    • E-books
    • Cheat Sheets
    • Blog
    • Events
    • Newsletter

    Communicate

    • About us
    • Contact sales
    • Find a partner
    • Report a website issue
    • Site Status Dashboard
    • Report a security problem

    RED HAT DEVELOPER

    Build here. Go anywhere.

    We serve the builders. The problem solvers who create careers with code.

    Join us if you’re a developer, software engineer, web designer, front-end designer, UX designer, computer scientist, architect, tester, product manager, project manager or team lead.

    Sign me up

    Red Hat legal and privacy links

    • About Red Hat
    • Jobs
    • Events
    • Locations
    • Contact Red Hat
    • Red Hat Blog
    • Inclusion at Red Hat
    • Cool Stuff Store
    • Red Hat Summit

    Red Hat legal and privacy links

    • Privacy statement
    • Terms of use
    • All policies and guidelines
    • Digital accessibility

    Report a website issue