Application Security

Red Hat Pushes New Tools to Secure Software Supply Chain

Red Hat rolls out a new suite of tools and services to help mitigate vulnerabilities across every stage of the modern software supply chain.

Supply chain attack

Enterprise open source software giant Red Hat on Tuesday announced a new suite of tools and services to help mitigate vulnerabilities across every stage of the modern software supply chain.

The company’s new Red Hat Trusted Software Supply Chain includes two new cloud services that promises to advance the successful adoption of DevSecOps practices, and embed security into every stage of the software development lifecycle. 

The new tools — Red Hat Trusted Application Pipeline and Red Hat Trusted Content — are promising help for developers to efficiently code, build and monitor their software using certified content and real-time security scanning and remediation. 

The company said the Red Hat Trusted Content offering builds on a foundation of security-enhanced systems software, with more than 10,000 trusted packages in Red Hat Enterprise Linux and a catalog of critical application runtimes across Java, Node and Python ecosystems. 

It is being pitched as a tool to provide developers with real-time knowledge of known vulnerabilities and security risks within their open source software dependencies. The service will also suggest possible remediations to minimize risks.

The Red Hat Trusted Application Pipeline, which is closely tied to the company’s work on sigstore, is being marketed as a tool for customers to enhance the security of application software supply chains with an integrated CI/CD pipeline. 

Red Hat said applications can be more securely built and more easily integrated into Linux containers and then deployed onto Red Hat OpenShift or other Kubernetes platforms with just a few clicks, removing potential for friction and human error.

The new cloud service can be used to import git repositories and configure container-native continuous build, test, and deployment pipelines via a cloud service in just a few steps; inspect source code and transitive dependencies; and auto-generate Software Bill of Materials (SBOMs) within builds.

Advertisement. Scroll to continue reading.

Related: Chainguard Trains Spotlight on SBOM Quality Problem

Related: Investors Bet on Ox Security to Guard Software Supply Chains

Related: Google Teams Up With GitHub for Supply Chain Security

Related: Chainguard Bags Massive $50M for Supply Chain Security

Related Content

Cloud Security

The CloudGrappler open source tool can detect the presence of known threat actors in cloud environments.

Application Security

Concluding a two-day OSS security summit, CISA details key actions to help improve open source security.

ICS/OT

Cisco has released an open source PoC tool named Badgerboard designed for improved backplane network visibility for OT. 

Fraud & Identity Theft

The open source platform Tazama provides cost-effective monitoring of digital financial transactions to prevent fraud in real time.

Threat Intelligence

Open source is a great way to test the waters and define requirements. But when looking at putting a platform into production, an enterprise-ready...

Application Security

Google has released its fuzzing framework in open source to boost the ability of developers and researchers to identify vulnerabilities.

Supply Chain Security

Two new products aim to secure the traditional OSS supply chain, and the new AI model software supply chain.

ICS/OT

A new project aims to make it easier for PLC programmers to implement secure coding practices by cataloging useful files and functions from each...

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version