Getting started with Red Hat Trusted Software Supply Chain

Consistently code, build, and monitor for a trusted software supply chain across any environment, for faster time to value with automated security guardrails.

red_hat-trusted_software_supply_chain-logo-transparent

Learning resources

Learning Path Trusted artifact learning path feature image
Learn how to install the Red Hat Trusted Artifact Signer using Google...
Learning Path Red Hat Trusted Artifact Signer
In this learning exercise, we'll set up the ability to sign and verify...
Learning Path Red Hat Trusted Artifact Signer
In this learning exercise, we'll learn how to automate the signing and...
Learning Path RHTAS and RHTPA image
In this learning exercise, you will learn how to secure your Jenkins pipeline...

Latest articles

Article Article

Introducing the new Multi-Cluster Alerting UI, a developer preview available...

Article Featured image for: micropipenv: Installing Python dependencies in containerized applications.

Discover how Red Hat Enterprise Linux (RHEL) provides security-compliant...

Article Vulnerability analysis of Golang applications and more with Red Hat CodeReady Dependency Analytics v0.3.2

Discover the benefits of native FIPS support in Go 1.24 and Red Hat's...

Article Feature image for Red Hat Enterprise Linux.
Feb 25, 2025
Valentin Rothberg +1

Learn about the benefits and security features of image mode for Red Hat...