Configuring Azure Pipelines
Red Hat Trusted Application Pipeline 1.5
Learn how to configure Azure CI for secure CI/CD workflows.
Abstract
This document provides instructions on setting up Azure CI to perform essential security tasks, such as vulnerability scanning, image signing, and attestation generation.