Skip to main content
Redhat Developers  Logo
  • AI

    Get started with AI

    • Red Hat AI
      Accelerate the development and deployment of enterprise AI solutions.
    • AI learning hub
      Explore learning materials and tools, organized by task.
    • AI interactive demos
      Click through scenarios with Red Hat AI, including training LLMs and more.
    • AI/ML learning paths
      Expand your OpenShift AI knowledge using these learning resources.
    • AI quickstarts
      Focused AI use cases designed for fast deployment on Red Hat AI platforms.
    • No-cost AI training
      Foundational Red Hat AI training.

    Featured resources

    • OpenShift AI learning
    • Open source AI for developers
    • AI product application development
    • Open source-powered AI/ML for hybrid cloud
    • AI and Node.js cheat sheet

    Red Hat AI Factory with NVIDIA

    • Red Hat AI Factory with NVIDIA is a co-engineered, enterprise-grade AI solution for building, deploying, and managing AI at scale across hybrid cloud environments.
    • Explore the solution
  • Learn

    Self-guided

    • Documentation
      Find answers, get step-by-step guidance, and learn how to use Red Hat products.
    • Learning paths
      Explore curated walkthroughs for common development tasks.
    • Guided learning
      Receive custom learning paths powered by our AI assistant.
    • See all learning

    Hands-on

    • Developer Sandbox
      Spin up Red Hat's products and technologies without setup or configuration.
    • Interactive labs
      Learn by doing in these hands-on, browser-based experiences.
    • Interactive demos
      Click through product features in these guided tours.

    Browse by topic

    • AI/ML
    • Automation
    • Java
    • Kubernetes
    • Linux
    • See all topics

    Training & certifications

    • Courses and exams
    • Certifications
    • Skills assessments
    • Red Hat Academy
    • Learning subscription
    • Explore training
  • Build

    Get started

    • Red Hat build of Podman Desktop
      A downloadable, local development hub to experiment with our products and builds.
    • Developer Sandbox
      Spin up Red Hat's products and technologies without setup or configuration.

    Download products

    • Access product downloads to start building and testing right away.
    • Red Hat Enterprise Linux
    • Red Hat AI
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Featured

    • Red Hat build of OpenJDK
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenShift Dev Spaces
    • Red Hat Developer Toolset

    References

    • E-books
    • Documentation
    • Cheat sheets
    • Architecture center
  • Community

    Get involved

    • Events
    • Live AI events
    • Red Hat Summit
    • Red Hat Accelerators
    • Community discussions

    Follow along

    • Articles & blogs
    • Developer newsletter
    • Videos
    • Github

    Get help

    • Customer service
    • Customer support
    • Regional contacts
    • Find a partner

    Join the Red Hat Developer program

    • Download Red Hat products and project builds, access support documentation, learning content, and more.
    • Explore the benefits

How to secure your Jenkins pipeline with Red Hat Advanced Developer Suite

August 14, 2025
Ramy El Essawy Tyrell Reddy
Related topics:
Developer productivityDeveloper toolsPlatform engineeringSecuritySecure coding
Related products:
Red Hat Advanced Developer SuiteRed Hat Developer HubRed Hat Trusted Application PipelineRed Hat Trusted Artifact SignerRed Hat Trusted Profile AnalyzerRed Hat Trusted Software Supply Chain

    The post Boost Jenkins pipelines with Red Hat Advanced Developer Suite showed how Red Hat Developer Hub and its one-click Software Templates can transform a developer's first week on the job from a ticket marathon into a 2-minute bootstrap. It described how a brand-new Jenkinsfile, a Red Hat OpenShift Dev Spaces workspace, and a CI pipeline are created automatically to help teams can innovate at full speed.

    But velocity alone isn’t a win if an attacker can infiltrate that same pipeline. In this follow-up post, we'll focus on a different aspect: you’ll harden the very Jenkins flow you spun up in part 1 by adding cryptographic signing, SBOM validation, and runtime enforcement—all without reinstating ticket ping-pong. 

    Note

    If you missed the previous post, hit pause and read that first; it sets up the framework we’re about to secure.

     Ready? Let’s move from fast to faster and safer.

    The pipeline at a glance

    Figure 1 shows the usual developer motions from left to right—commit, build, test, deploy—but each hand-off now carries cryptographic proof and policy assurance:

    1. A commit is signed as it leaves the laptop.
    2. The CI verifies the signature before any build logic runs.
    3. The container image is built and then signed with Red Hat Trusted Artifact Signer.
    4. A Software Bill of Materials (SBOM) is generated and analyzed using Red Hat Trusted Profile Analyzer for CVEs and license risk.
    5. The image is pushed to Red Hat Quay, scanned again, and finally admitted to the cluster only if Red Hat Advanced Cluster Security confirms everything is in order.
    6. Policy gate halts the pipeline if signatures or SBOM checks fail.
    target_pipeline
    Figure 1: An end-to-end software supply chain pipeline incorporates cryptographic proof and policy checks at each stage, from a signed commit to deployment on an OpenShift cluster.

    Teams maintain velocity, and trust is enforced.

    Meet the security line-up

    The Red Hat Advanced Developer Suite adds 3 heavyweight security services into Jenkins with almost no extra configuration:

    • Red Hat Trusted Artifact Signer generates and manages cryptographic keys, then signs every image and commit, recording in-toto provenance.
    • Red Hat Trusted Profile Analyzer ingests Software Bills of Materials (SBOMs), checks them against CVE and license risks, and returns a pass/fail verdict.
    • Conforma (formerly Enterprise Contracts) ties signatures and SBOM verdicts together, blocking non-compliant artifacts before the pipeline continues.

    These services are complemented by 2 powerful tools:

    • Red Hat Quay: An enterprise registry that scans, stores, and serves only trusted images.
    • Red Hat Advanced Cluster Security for Kubernetes: Runtime security, vulnerability scanning, and policy enforcement so that only signed trusted images make it to production.

    Together, they help create an unbreakable chain of custody from commit to Kubernetes scheduler.

    Wiring the guardrails into Jenkins

    Red Hat Advanced Developer Suite weaves its security guardrails into the toolchain you already run—Jenkins jobs, GitOps workflows, and container registries—through containerized services, REST APIs, and drop-in plug-ins. 

    At build time, Red Hat Trusted Artifact Signer adds cryptographic signatures and in-toto provenance with a single pipeline step. The resulting image’s Software Bill of Materials is then fed to Red Hat Trusted Profile Analyzer, which evaluates CVEs, licenses, and custom policies before the job can advance.

    All verdicts stream back to Red Hat Developer Hub, giving developers and platform teams one portal to trigger builds, observe guardrails in action, and trace every artifact on its path to production. This delivers cryptographic trust and real-time risk insight without forcing a pipeline rewrite or slowing release velocity. 

    We used the following Jenkins file to include those security guardrails:

    pipeline {
      agent any
      environment {
        IMAGE = 'quay.io/demo/wealthwise-backend:latest'
        SBOM_ID = "wwb-${BUILD_NUMBER}"
        TAS_KEY    = credentials('cosign-key')
        TPA_TOKEN  = credentials('rhtpa-token')
        ACS_TOKEN  = credentials('rhacs-token')
        TPA_URL    = 'https://rhtpa.demo'
      }
      stages {
        stage('Clone source code') {
          steps { sh 'git clone https://gitlab.com/rhpds/app.git' }
        }
        stage('Verify commit') {
          steps { sh 'gitsign verify --certificate-identity=<email> --certificate-oidc-issuer=<issuer-url>' }
        }
        stage('Build & Unit Test') {
          steps { sh 'mvn clean package -DskipTests' }
        }
        stage('Containerise & Push') {
          steps { sh """
            podman build -t $IMAGE .
            podman push  $IMAGE
          """}
        }
        stage('Sign Image (RHTAS)') {
          steps { sh "cosign sign --key \$TAS_KEY \$IMAGE" }
        }
        stage('Generate & Upload SBOM (RHTPA)') {
          steps { sh """
            syft $IMAGE -o json > sbom.json
            curl -H 'Authorization: Bearer $TPA_TOKEN' \
                 -H 'Content-Type: application/json' \
                 --data @sbom.json \
                 $TPA_URL/api/v1/sbom?id=$SBOM_ID
          """}
        }
        stage('Enterprise-Contract Gate') {
          steps { sh """
            enterprise-contract verify image \
              --image \$IMAGE \
              --public-key ${TAS_KEY}.pub \
              --policy git::github.com/demo/policies//base
          """}
        }
        stage('RHACS Admission Check') {
          steps { sh """
            export ROX_API_TOKEN=$ACS_TOKEN
            roxctl image check \$IMAGE
          """}
        }
      }
    }

    The previous Jenkins file shows where each Advanced Developer Suite control plugs in and explains why it matters. Let’s walk through it from top to bottom so the purpose of every stanza is crystal clear.

    In the Environment block, we declare the image tag, an SBOM ID, and three secrets that Jenkins pulls from its credential store: TAS_KEY for Cosign signing, TPA_TOKEN for talking to Trusted Profile Analyzer, and ACS_TOKEN for the final runtime gate. These variables are set once by the platform team; developers never see the keys themselves. 

    We then define the pipeline stages:

    1. Clone source code: Clone the source code into the workspace
    2. Verify commit: Verify that the latest commit was signed by a trusted source
    3. Build and unit test stage: Classic Maven compile. Nothing specific to Red Hat Advanced Developer Suite here—just good old CI doing its job.
    4. Containerize and push: We use podman build to create the image and immediately push it to Quay. At this point the image exists, but it’s not yet trusted.
    5. Sign image (Trusted Artifact Signer): One line of Cosign gives the image a cryptographic signature plus an in-toto provenance file. If an attacker later swaps the image, the signature check will fail and the pipeline won’t proceed.
    6. Generate and upload SBOM (Trusted Profile Analyzer): We produce a Software Bill of Materials, then a cURL call uploads that SBOM to the Analyzer service. The Analyzer inspects the manifest for CVEs, license risk, and custom policy, and then records the verdict against the SBOM ID.
    7. Enterprise-contract gate: This CLI ties the two earlier steps together. It verifies that:

      • The cryptographic signature is valid and points to the correct public key.
      • The analyzer gave the SBOM a “pass.”

      If either check fails, Jenkins marks the build unstable—long before anything ships.

    8. Advanced Cluster Security admission check: Even after the build clears all earlier gates, Advanced Cluster Security runs one last policy check at cluster-admission time. Think of it as the bouncer who verifies the ID again before letting the container onto the dance floor.

    From the developer’s perspective the pipeline still feels familiar—build, test, push, deploy—but beneath the surface, every handoff now carries cryptographic proof and policy compliance. That's the value of Red Hat Advanced Developer Suite: security is integrated into your existing CI flow, not added on as an afterthought.

    Embedding the secure pipeline in a Software Template

    Platform engineers wrap that Jenkinsfile into a Software Template in Developer Hub, adding just two extra fields to the template’s parameters: block—cosignKey and rhtpaToken. Developers still fill out a 1-page form, click Create, and get the same friction-free repo as before, only now the pipeline is signed, scanned, and policy-enforced by default.

    No extra PRs, no nightly checklist, no Slack chasers.

    Real-world impact

    Industry pilots that pair developer-velocity tooling with supply-chain guardrails typically show 3 clear trends (figures aggregated from Red Hat field engagements and customer briefings, 2024-2025):

    • ~30% faster cycle times once security checks are moved from out-of-band spreadsheets into automated pipeline stages.
    • Up to 40% fewer audit exceptions when SBOM validation and policy enforcement run on every build instead of at release time.
    • Zero unsigned images in production wherever signature verification is enforced by admission controllers such as Enterprise Contract or Advanced Cluster Security.

    The takeaway is consistent: you can keep your delivery velocity and dramatically lower risk when security becomes code, not a checklist.

    Conclusion

    Velocity without trust is a gamble. By adding Red Hat Trusted Artifact Signer, Red Hat Trusted Profile Analyzer, Red Hat Quay, and Red Hat Advanced Cluster Security to an ordinary Jenkinsfile, you weld proof and policy into every artifact—without slowing teams down.

    Ready to try it yourself?

    • Revisit part 1, Boost Jenkins pipelines with Red Hat Advanced Developer Suite, to see how the pipeline scaffolding is generated in seconds.
    • Explore the full Red Hat Advanced Developer Suite.
    • Get hands on with Red Hat Trusted Artifact Signer.
    • Analyze your own SBOMs using Red Hat Trusted Profile Analyzer.

    Move fast, deliver with confidence, and let the guardrails do the heavy lifting.

    Related Posts

    • Boost Jenkins pipelines with Red Hat Advanced Developer Suite

    • A developer's guide to CI/CD and GitOps with Jenkins Pipelines

    • What is the Red Hat Advanced Developer Suite? An overview

    • Red Hat Developer Hub: The fastest path to Backstage on Kubernetes

    • Backstage authentication and catalog providers: A practical guide

    • 10 tips for better Backstage Software Templates

    Recent Posts

    • Debugging image mode with Red Hat OpenShift 4.20: A practical guide

    • EvalHub: Because "looks good to me" isn't a benchmark

    • SQL Server HA on RHEL: Meet Pacemaker HA Agent v2 (tech preview)

    • Deploy with confidence: Continuous integration and continuous delivery for agentic AI

    • Every layer counts: Defense in depth for AI agents with Red Hat AI

    What’s up next?

    Writing “Hello, World” hasn’t gotten any harder—but running it has. Download our developer’s guide to developer portals to learn how engineering teams can reduce friction and boost productivity using internal developer portals (IDPs).

    Get the e-book
    Red Hat Developers logo LinkedIn YouTube Twitter Facebook

    Platforms

    • Red Hat AI
    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Build

    • Developer Sandbox
    • Developer tools
    • Interactive tutorials
    • API catalog

    Quicklinks

    • Learning resources
    • E-books
    • Cheat sheets
    • Blog
    • Events
    • Newsletter

    Communicate

    • About us
    • Contact sales
    • Find a partner
    • Report a website issue
    • Site status dashboard
    • Report a security problem

    RED HAT DEVELOPER

    Build here. Go anywhere.

    We serve the builders. The problem solvers who create careers with code.

    Join us if you’re a developer, software engineer, web designer, front-end designer, UX designer, computer scientist, architect, tester, product manager, project manager or team lead.

    Sign me up

    Red Hat legal and privacy links

    • About Red Hat
    • Jobs
    • Events
    • Locations
    • Contact Red Hat
    • Red Hat Blog
    • Inclusion at Red Hat
    • Cool Stuff Store
    • Red Hat Summit
    © 2026 Red Hat

    Red Hat legal and privacy links

    • Privacy statement
    • Terms of use
    • All policies and guidelines
    • Digital accessibility

    Chat Support

    Please log in with your Red Hat account to access chat support.