Red Hat Trusted Application Pipeline 1.2
Discover
Release notes for Red Hat Trusted Application Pipeline 1.2
Explore new features in this release and learn about known issues.
About Red Hat Trusted Application Pipeline
Learn how to secure your software development lifecycle with Red Hat Trusted Application Pipeline.
Get Started
Getting Started with Red Hat Trusted Application Pipeline
Explore ready-to-use software templates for building applications that are infused with secure supply chain features, such as signatures, attestations, Software Bill of Materials (SBOM), SLSA verification, CVE scanning, and release policy guardrails.
Standalone CLIs
Explore the standalone CLIs you can use with Red Hat Trusted Application Pipeline.
Install
Installing Red Hat Trusted Application Pipeline
Learn how to install Red Hat Trusted Application Pipeline in your cluster.
Secure Your Software Supply Chain
Inspecting your SBOM using Red Hat Trusted Profile Analyzer
Learn how to scan your SBOM to gain actionable information about the security posture of your application.
Customizing Red Hat Trusted Application Pipeline
Learn how to customize default software templates and build pipeline configurations.
Managing compliance with Enterprise Contract
Learn how Enterprise Contract enables you to better verify and govern compliance of the code you promote. Additionally, customize the sample policies to fit your corporate standards.