Getting started with Red Hat Trusted Software Supply Chain

Consistently code, build, and monitor for a trusted software supply chain across any environment, for faster time to value with automated security guardrails.

red_hat-trusted_software_supply_chain-logo-transparent

Learning resources

Learning Path Trusted artifact learning path feature image
Learn how to install the Red Hat Trusted Artifact Signer using Google...
Learning Path Red Hat Trusted Artifact Signer
In this learning exercise, we'll set up the ability to sign and verify...
Learning Path Red Hat Trusted Artifact Signer
In this learning exercise, we'll learn how to automate the signing and...
Learning Path RHTAS and RHTPA image
In this learning exercise, you will learn how to secure your Jenkins pipeline...

Latest articles

Article secure access

Learn how you can now use deny rules to remove SELinux permissions from the...

Article Coding shared image

Discover the features and benefits of Red Hat Advanced Developer Suite,...

Article Featured image for Red Hat Enterprise Linux.
May 15, 2025
Emanuele Giuseppe Esposito +2

Learn how to run a fraud detection AI model using confidential virtual...

Article A code editor with four icons symbolizing DevOps, developers, a gear, and a cluster.

Learn about attestations from a neutral observer and how to make meaningful...