Getting started with Red Hat Trusted Software Supply Chain

Consistently code, build, and monitor for a trusted software supply chain across any environment, for faster time to value with automated security guardrails.

Contact us
A shield and workflow 3-d object overlaid on top of the Red Hat Cross platform texture

Learning resources

Learning Path Trusted artifact learning path feature image
Learn how to install the Red Hat Trusted Artifact Signer using Google...
Learning Path Sign and verify artifacts feature image
In this learning exercise, we'll set up the ability to sign and verify...
Learning Path Red Hat Trusted Artifact Signer
In this learning exercise, we'll learn how to automate the signing and...
Learning Path RHTAS and RHTPA image
In this learning exercise, you will learn how to secure your Jenkins pipeline...

Latest articles

Article Red Hat AI

Learn how Red Hat AI can help address the security challenges of AI agents in...

Article containers

Learn about some of the quirks of running a build command in a distroless image.

Article Featured image for security.

Scale agentic AI with Red Hat’s trusted software factory. Use Policy as...

Article openshift containers
May 13, 2026
Emanuele Giuseppe Esposito

Deploy confidential containers and CVMs for AI. Learn how the Red Hat build...