Getting started with Red Hat Trusted Software Supply Chain

Consistently code, build, and monitor for a trusted software supply chain across any environment, for faster time to value with automated security guardrails.

Contact us
red_hat-trusted_software_supply_chain-logo-transparent

Learning resources

Learning Path Trusted artifact learning path feature image
Learn how to install the Red Hat Trusted Artifact Signer using Google...
Learning Path Sign and verify artifacts feature image
In this learning exercise, we'll set up the ability to sign and verify...
Learning Path Red Hat Trusted Artifact Signer
In this learning exercise, we'll learn how to automate the signing and...
Learning Path RHTAS and RHTPA image
In this learning exercise, you will learn how to secure your Jenkins pipeline...

Latest articles

Article Featured image for: SCTP over UDP in the Linux kernel.
Sep 17, 2025
Pedro Navarro Perez

Learn how to leverage kernel live patching to keep your infrastructure...

Article Red Hat Enterprise Linux 9 feature_image

Learn how to implement encrypted DNS (DoT) on Red Hat Enterprise Linux 10 and...

Article containers
Sep 15, 2025
Emanuele Giuseppe Esposito

Discover how the two technologies, confidential containers and confidential...

Article secure coding - simple

Learn how to use the IdM DoT feature to provide a secure upstream DNS server...