Red Hat Trusted Software Supply Chain is now generally available.

Updated -

As part of the Red Hat Trusted Software Supply Chain portfolio of products, we're excited to announce general availability of Red Hat Trusted Application Pipeline and Red Hat Trusted Artifact Signer, with Red Hat Trusted Profile Analyzer in technical preview.

Customers stay compliant to security practices without the costly overheads as they quickly and efficiently code, build, deploy and monitor to a trusted software supply chain. Using self-managed, on-premise capabilities that are easily layered onto their application platforms, customers reduce development time as they improve software resiliency, and automate continuous deployment with security-focused workflows.

Check out the press release to learn more about this announcement and how you can adopt Red Hat’s open source software supply chain to Shift Security Left to catch vulnerabilities early. Start curating for your own trusted content and improve pipeline security posture, to meet your development teams where they are with low effort and cost.

Additional resources: