Red hat:可信的软件供应链 (2020)

ID:64192

大小:0.18 MB

页数:2页

时间:2023-06-29

金币:10

上传者:亚森
redhat.com
facebook.com/redhatinc
@RedHat
linkedin.com/company/red-hat
Benefits of DevSecOps
Fast development
With short feedback loops,
product managers and
developers find out sooner
if they are off course so that
they can swiftly
make corrections.
More security by default
Fully automated risk
characterization,
mitigation, and monitoring
across the application life
cycle help decrease risk.
Operational excellence
Software is built on a
foundation of resilience,
including trusted code
repositories and site reliability
engineering (SRE).
Deploy at the speed of operations
Mission and user needs change frequently—and sometimes suddenly. Deploying new software at
the “speed of operations” requires trust that the software is compliant, high-quality, more secure by
default, and observable.
Practices like test driven development (TDD) and continuous integration/continuous delivery (CI/
CD) promote a DevSecOps culture and build trust. But introducing these practices is one thing
and enforcing them is another. Imagine that a development team leader implements an end-of-day
process for team members to check in code, test, send the test report to management, and deploy
code to a shared environment if the test succeeds. What if a team member checks in and deploys
code, skipping the steps in between? Even when teams have the best intentions, making sure they do
the right things is difficult without development guardrails.
A trusted software supply chain (TSSC) provides those guardrails by accelerating and enforcing the
right behaviors (see sidebar).
The value of a trusted software supply chain
Software teams, business leaders, and users can trust that software produced by a TSSC meets the
agency’s standards for:
Security. Applications do not act maliciously and have defenses to protect them from
malicious actors.
Compliance. Applications adhere to required controls.
Privacy. Applications protect sensitive information that should not be shared.
Transparency. Applications produce metadata—for example, about health and security posture—
so that software behavior is observable and verifiable.
Trust that software complies with your agency’s security, compliance, privacy, and transparency
standards can also accelerate issuance of authority to operate (ATO) by discouraging behaviors that
can slow the process.
Elements of the trusted software supply chain
Powered by Red Hat® OpenShift® Container Platform, a TSSC brings together trusted third-party
tools and prescriptive workflows for best practices such as TDD and CI/CD. The TSSC enforces best
practices—for example, by not allowing code into production before it has been validated with static
code analysis and security scanning tools. It also makes the right action easy—for example, by
requiring developers to pull components (containers, libraries, binaries) from a trusted code
repository. By enforcing best practices with opinionated gates and other controls, a TSSC provides
a high degree of confidence in code deployments. This helps operations teams adopt efficiency-
boosting SRE practices.
Brief
Trusted software supply chain
Accelerate and enforce the right behaviors
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭