Skip to content

Commit 9253b91

Browse files
mlorenzofrgaurav-nelson
authored andcommitted
mbp-1020: Add UC02 Secure Supply Chain to layered-zero-trust
Signed-off-by: Manuel Lorenzo <mlorenzofr@redhat.com>
1 parent 3790f21 commit 9253b91

File tree

4 files changed

+575
-0
lines changed

4 files changed

+575
-0
lines changed

content/patterns/layered-zero-trust/_index.adoc

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,8 @@ The solution integrates many Red{nbsp}Hat components to offer:
6767
* Identity and access management by using the Red{nbsp}Hat build of Keycloak (RHBK).
6868
* Certificate management for secure communications.
6969
* External secret management integration.
70+
* Cryptographic signing and verification.
71+
* SBOM vulnerability analysis.
7072

7173
[id="architecture"]
7274
=== Architecture
@@ -94,6 +96,18 @@ The pattern consists of the following key components:
9496
* link:https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.14[{rh-rhacm-first}]
9597
** Provides a management control plane in multi-cluster scenarios.
9698

99+
* link:https://docs.redhat.com/en/documentation/red_hat_quay/3.15[Red{nbsp}Hat Quay]
100+
** Enables a private repository for OCI images within our environment.
101+
102+
* link:https://docs.redhat.com/en/documentation/red_hat_openshift_container_storage/4.8/html/managing_hybrid_and_multicloud_resources/index[Multicloud Object Gateway]
103+
** Provides an object storage service for {ocp}.
104+
105+
* link:https://docs.redhat.com/en/documentation/red_hat_trusted_artifact_signer/1.3[Red{nbsp}Hat Trusted Artifact Signer (RHTAS)]
106+
** Provides cryptographic signing and verification of software artifacts and container images.
107+
108+
* link:https://docs.redhat.com/es/documentation/red_hat_trusted_profile_analyzer/2.2[Red{nbsp}Hat Trusted Profile Analyzer (RHTPA)]
109+
** Provides the storage and management means for _Software Bills of Materials_ (SBOMs), with cross-referencing capabilities between SBOMs and CVEs/Security Advisories.
110+
97111
[id="sidecar-pattern"]
98112
==== Sidecar pattern
99113

@@ -127,3 +141,7 @@ The following technologies are used in this solution:
127141
* *Compliance Operator*: Provides ability to scan and remediate cluster hardening based on profiles
128142
* *QTodo application*: Serves as a sample Quarkus-based application to show zero trust principles.
129143
* *PostgreSQL database*: Provides the backend database for the demonstration application.
144+
* *Multicloud Object Gateway*: Lightweight object storage service for {ocp}. Used as storage by Quay.
145+
* *Red{nbsp}Hat Quay*: Private registry for OCI images.
146+
* *Red{nbsp}Hat Trusted Artifact Signer*: Facilitates signing and verification of binary objects in the cluster.
147+
* *Red{nbsp}Hat Trusted Profile Analyzer*: Enables SBOM file analysis and vulnerability detection.

0 commit comments

Comments
 (0)