Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
38 commits
Select commit Hold shift + click to select a range
d945908
mbp-1020: Add UC02 Secure Supply Chain to layered-zero-trust
mlorenzofr Dec 8, 2025
db54b6c
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
a392ebd
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
54356ff
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
b5661b8
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
bc87d14
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
16f91f3
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
72b79be
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
398e6ae
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
f7c2ff1
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
a00eb5d
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
58170c4
Update content/patterns/layered-zero-trust/_index.adoc
mlorenzofr Dec 11, 2025
97e5ba3
Update content/patterns/layered-zero-trust/_index.adoc
mlorenzofr Dec 11, 2025
0d6ad0f
Update content/patterns/layered-zero-trust/_index.adoc
mlorenzofr Dec 11, 2025
07d565a
Update content/patterns/layered-zero-trust/_index.adoc
mlorenzofr Dec 11, 2025
70d3b47
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
8685740
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
cbcd64e
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
d16b54f
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
164c784
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
a066acc
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
965a66d
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
fbaa9e1
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
8b015b4
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
602e733
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
db13faf
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
a141f7d
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
8f4459e
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
4d469e6
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
5e1b597
Add ec documentation
mlorenzofr Dec 11, 2025
313cbc7
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
fef56b8
Update content/patterns/layered-zero-trust/lzt-secure-supply-chain.adoc
mlorenzofr Dec 11, 2025
10e1a04
Remove TUF ref
mlorenzofr Dec 11, 2025
4f7ce67
Remove SNAPSHOT from jar name
mlorenzofr Dec 11, 2025
4e9eba9
Switching attestation to OIDC token
mlorenzofr Dec 11, 2025
2a5aded
Add conclusion
mlorenzofr Dec 11, 2025
ca51e94
Add goals in the introduction
mlorenzofr Dec 11, 2025
267592b
Add steps for RHTPA web UI
mlorenzofr Dec 11, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 18 additions & 0 deletions content/patterns/layered-zero-trust/_index.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -67,6 +67,8 @@ The solution integrates many Red{nbsp}Hat components to offer:
* Identity and access management by using the Red{nbsp}Hat build of Keycloak (RHBK).
* Certificate management for secure communications.
* External secret management integration.
* Cryptographic signing and verification.
* SBOM vulnerability analysis.

[id="architecture"]
=== Architecture
Expand Down Expand Up @@ -94,6 +96,18 @@ The pattern consists of the following key components:
* link:https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.14[{rh-rhacm-first}]
** Provides a management control plane in multi-cluster scenarios.

* link:https://docs.redhat.com/en/documentation/red_hat_quay/3.15[Red{nbsp}Hat Quay]
** Enables a private repository for OCI images within the environment.

* link:https://docs.redhat.com/en/documentation/red_hat_openshift_container_storage/4.8/html/managing_hybrid_and_multicloud_resources/index[Multicloud Object Gateway]
** Provides an object storage service for {ocp}.

* link:https://docs.redhat.com/en/documentation/red_hat_trusted_artifact_signer/1.3[Red{nbsp}Hat Trusted Artifact Signer (RHTAS)]
** Provides cryptographic signing and verification of software artifacts and container images.

* link:https://docs.redhat.com/es/documentation/red_hat_trusted_profile_analyzer/2.2[Red{nbsp}Hat Trusted Profile Analyzer (RHTPA)]
** Provides the storage and management means for _Software Bill of Materials_ (SBOMs), with cross-referencing capabilities between SBOMs and CVEs/Security Advisories.

[id="sidecar-pattern"]
==== Sidecar pattern

Expand Down Expand Up @@ -127,3 +141,7 @@ The following technologies are used in this solution:
* *Compliance Operator*: Provides ability to scan and remediate cluster hardening based on profiles
* *QTodo application*: Serves as a sample Quarkus-based application to show zero trust principles.
* *PostgreSQL database*: Provides the backend database for the demonstration application.
* *Multicloud Object Gateway*: Lightweight object storage service for {ocp}. Used by Quay for the storage of binary blobs.
* *Red{nbsp}Hat Quay*: Private registry for OCI images.
* *Red{nbsp}Hat Trusted Artifact Signer*: Facilitates signing and verification of software artifacts.
* *Red{nbsp}Hat Trusted Profile Analyzer*: Enables SBOM file analysis and vulnerability detection.
Loading