Code with integrated application security checks
More than two-thirds of application code is inherited from open source dependencies. Leverage Red Hat’s open source security expertise in application code. Add Red Hat Trusted Content (in service preview) of curated builds and hardened open source libraries that’s been verified and attested with provenance checks. Remove malicious code with pro-active vulnerability analysis, notification, and remediation with out-of-the-box plug-ins to your IDE. Crypto sign and certify your code before pushing into commit, using an open, transparent ledger that logs all your submissions with Red Hat Trusted Artifact Signer (in technical preview).
Build with security-focused CI/CD workflows
Building security into container images is an integral part of the software supply chain for cloud-native applications. Red Hat Trusted Application Pipeline (in service preview) provides default pipeline definitions and automated security checks to generate Supply chain Levels for Software Artifacts (SLSA) Level 3 build images from application code across a variety of programming languages. The build includes creating an attested, immutable Software Bill of Materials (SBOM) that automatically creates a chain of trust for your open source components and transitive dependencies.
Deploy continuously with release policies as-code
SLSA Level 3 and higher requires a security-focused release workflow to deploy container images with Red Hat OpenShift GitOps to their respective cloud platforms. The deployments can be to a variety of Kubernetes clusters, including Red Hat OpenShift clusters providing consistency across development, testing, staging and production. Take advantage of Pipeline-as-Code capabilities to customize the default pipeline configuration with Red Hat OpenShift Pipelines. Policy-as-code that covers from integration tests to a customizable Enterprise contract, deployment and releases for the software development lifecycle can be configured to prevent suspicious build activity from being promoted. GitOps principles that serve as a single source of truth that drives the entire release workflow, stored and managed from various types of Git repositories.
Monitor and identify runtime security incidents
Capitalize the unified experience to monitor the health and security of the containerized applications that are deployed across multiple cloud platforms. With the integration of Red Hat Advanced Cluster Security Cloud Service (limited availability), security issues in the deployed containers and the Kubernetes runtime environment can be easily detected and remedied. Continuously monitor the behavior of software components and dependencies to observe the impact of risk profile changes made. Instantly detect and alert on security issues early before your users do, using analytics-driven insights that directs with in-context troubleshooting. Prioritize and drill down on alerts by severity to reduce alert fatigue. Existing build images stored and shared in registries also need to be constantly scanned for new, emerging threats each day. Identify and mitigate security risks well before running the image with Red Hat Quay.