Red Hat Trusted Application Pipeline
Shift security left in the software supply chain
Catch vulnerabilities early with a self-serve developer experience imbued with the organization’s security practices, for distributed teams to comply with security and compliance requirements. Development teams leverage solution templates with integrated security checks to standardize and expedite security-focused golden paths with Red Hat Trusted Application Pipeline. Remove toil in finding and fixing vulnerabilities early. Increase security posture in the CI/CD pipeline with an automated chain of trust that verifies compliance is met.
Red Hat Trusted Application Pipeline validates artifacts signatures, provenance, and attestations to stop suspicious build activity from being promoted.
Red Hat Trusted Application Pipeline is generally available now
Start curating your own trusted content and increase the security posture in your pipelines. With Red Hat Trusted Application Pipeline, increase transparency and trust early in code-time while safeguarding the build systems from a self-serve developer hub:
See what’s new in Red Hat Trusted Application Pipeline Red Hat Trusted Application Pipeline documentation
Red Hat Trusted Application Pipeline features
Red Hat Trusted Application Pipeline performs numerous checks on your software artifacts and predefined dependencies for CVEs just as code is written. We also prevent source code injection and image poisoning in your build system each time when pull requests are triggered to merge code for new builds. This means you can:
Integrations
Red Hat Trusted Application Pipeline offers flexibility and choice to customers for these self managed, on-premise capabilities to be easily layered onto application platforms like Red Hat OpenShift, or be consumed in parts to meet their developers where they are. Parts such as Red Hat Developer Hub, Red Hat Trusted Profile Analyzer, Red Hat Trusted Artifact Signer that can be sold separately.
Red Hat Developer Hub
An enterprise-grade, open developer platform for building developer portals,...
Red Hat Trusted Profile Analyzer
Use your software assets with confidence. Curate your trusted content by...
Red Hat Trusted Artifact Signer
Enables cryptographic signing, verification of software, and provenance...
Red Hat OpenShift
Open, hybrid-cloud Kubernetes platform to build, run, and scale...
Featured resources
A developer’s guide to setting supply chain security in DevSecOps
White paper: Tackling CI/CD Security Anti-Patterns
Analyst brief: Getting started with CI/CD Pipeline Security
A blueprint for supply chain security
Latest blogs & articles
Establishing software supply chain security: Jenkins with Red Hat Trusted Artifact...
As cyber threats become increasingly sophisticated, organizations need...
Red Hat Trusted Application Pipeline - 1.0.2 Maintenance Release
1.0.2 Maintenance Release Announcement In case you were wondering why...
Red Hat Trusted Software Supply Chain is now available
Discover how Red Hat Trusted Software Supply Chain makes it easier to create,...
An introduction to Red Hat Trusted Application Pipeline
Discover more about Red Hat Trusted Application Pipeline, a secure and easy...