Security is at the top of mind for our customers, and understanding the language and practices around security is vital for teams delivering applications and managing infrastructure. Understanding how Red Hat reports and evaluates security vulnerabilities — as well as the tools Red Hat uses to communicate and address vulnerabilities — goes a long way towards protecting your IT environment.
In addition, learning why Red Hat utilizes an open methodology to vulnerability management is equally important. Red Hat doesn’t just produce enterprise open source software; from start to finish we do so with transparency and accountability. We believe this is critical for customers and communities to fully understand the vulnerabilities that may impact them, as well as provide the data necessary to make appropriate, informed decisions.
You'll find a great deal of information on vulnerabilities that affect open source software that makes up Red Hat's products, but what we provide often differs from the upstream software. Since vulnerability analysis on upstream software may not apply to the products you use today, we provide authoritative information about our products that can help inform your practices and response.
We communicate about our policies and practices frequently, through posts on the Red Hat Blog, through advisories and in articles on the Red Hat Customer Portal, sessions at Red Hat Summit and more.
Bringing it all together
We'll continue to write and speak about these topics, but we wanted to give our customers and communities a single document as a convenient reference to better understand how we categorize, address and respond to security vulnerabilities.
In "An Open Approach to Vulnerability Management" you can learn:
-
How Red Hat reports and evaluates vulnerabilities using Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE), and the Common Vulnerability Scoring System (CVSS) standards.
-
How our Severity Ratings system works and when a vulnerability poses a severe and immediate threat to your environment and when a vulnerability is unlikely to impact your environment.
-
How Red Hat's product support life cycle informs our response to security issues.
-
How Red Hat uses backporting and rebasing to address vulnerabilities.
-
What content signing is, and how to use it to verify software is from Red Hat, and untampered with.
Grab An Open Approach to Vulnerability Management today
There's plenty more to learn about Red Hat’s methodology of understanding and addressing security vulnerabilities. Get your copy of An Open Approach to Vulnerability Managements today and be sure to follow the Security channel here on the Red Hat Blog.
À propos de l'auteur
Red Hat Product Security provides the guidance, stability and security needed to confidently deploy enterprise solutions.
Parcourir par canal
Automatisation
Les dernières nouveautés en matière d'automatisation informatique pour les technologies, les équipes et les environnements
Intelligence artificielle
Actualité sur les plateformes qui permettent aux clients d'exécuter des charges de travail d'IA sur tout type d'environnement
Cloud hybride ouvert
Découvrez comment créer un avenir flexible grâce au cloud hybride
Sécurité
Les dernières actualités sur la façon dont nous réduisons les risques dans tous les environnements et technologies
Edge computing
Actualité sur les plateformes qui simplifient les opérations en périphérie
Infrastructure
Les dernières nouveautés sur la plateforme Linux d'entreprise leader au monde
Applications
À l’intérieur de nos solutions aux défis d’application les plus difficiles
Programmes originaux
Histoires passionnantes de créateurs et de leaders de technologies d'entreprise
Produits
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Services cloud
- Voir tous les produits
Outils
- Formation et certification
- Mon compte
- Assistance client
- Ressources développeurs
- Rechercher un partenaire
- Red Hat Ecosystem Catalog
- Calculateur de valeur Red Hat
- Documentation
Essayer, acheter et vendre
Communication
- Contacter le service commercial
- Contactez notre service clientèle
- Contacter le service de formation
- Réseaux sociaux
À propos de Red Hat
Premier éditeur mondial de solutions Open Source pour les entreprises, nous fournissons des technologies Linux, cloud, de conteneurs et Kubernetes. Nous proposons des solutions stables qui aident les entreprises à jongler avec les divers environnements et plateformes, du cœur du datacenter à la périphérie du réseau.
Sélectionner une langue
Red Hat legal and privacy links
- À propos de Red Hat
- Carrières
- Événements
- Bureaux
- Contacter Red Hat
- Lire le blog Red Hat
- Diversité, équité et inclusion
- Cool Stuff Store
- Red Hat Summit