{"id":54325,"date":"2024-04-18T14:54:08","date_gmt":"2024-04-18T18:54:08","guid":{"rendered":"https:\/\/sdtimes.com\/?p=54325"},"modified":"2024-04-18T14:58:40","modified_gmt":"2024-04-18T18:58:40","slug":"red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings","status":"publish","type":"post","link":"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/","title":{"rendered":"Red Hat Trusted Software Supply Chain gets updated with three new offerings"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Red Hat is expanding its <\/span><a href=\"https:\/\/developers.redhat.com\/products\/trusted-software-supply-chain\/overview\"><span style=\"font-weight: 400;\">Red Hat Trusted Software Supply Chain<\/span><\/a><span style=\"font-weight: 400;\"> solution with new offerings that will enable customers to ensure software components are verified and secured.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first new addition is Red Hat Trusted Artifact Signer, now generally available, which allows developers to cryptographically sign and verify application artifacts with a keyless certificate authority.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Red Hat, the benefit of this new offering is that it enables organizations to be more confident about the integrity of software without having to manage a centralized key management system.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Next, the company announced Red Hat Trusted Profile Analyzer, also now generally available, which provides a single source of truth for documentation like Software Bill of Materials (SBOMs) and Vulnerability Exploitability Exchange (VEX).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And finally, Red Hat Trusted Application Pipeline, now in beta, incorporates supply chain security capabilities into software templates that developers use. The company explained that this new offering will provide more traceability and auditability throughout the CI\/CD pipeline.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cOrganizations are seeking to mitigate the risks of constantly evolving security threats in their software development &#8211; to keep and grow trust with users, customers and partners,\u201d said Sarwar Raza, vice president and general manager of the Application Developer Business Unit at Red Hat. \u201cRed Hat Trusted Software Supply Chain is designed to seamlessly bring security capabilities into every phase of the software development life cycle. From code time to runtime, these tools help increase transparency and trust and give DevSecOps teams the ability to lay the groundwork for a more secure enterprise without impacting developer velocity or cognitive load.\u201d<\/span><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Red Hat is expanding its Red Hat Trusted Software Supply Chain solution with new offerings that will enable customers to ensure software components are verified and secured.\u00a0 The first new addition is Red Hat Trusted Artifact Signer, now generally available, which allows developers to cryptographically sign and verify application artifacts with a keyless certificate authority.\u00a0  &hellip; <a class=\"read-more\" href=\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/\">continue reading<\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":752,"featured_media":54326,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"cybocfi_hide_featured_image":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[220,45,16101],"coauthors":[11687],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Red Hat Trusted Software Supply Chain gets updated with three new offerings - SD Times<\/title>\n<meta name=\"description\" content=\"The first new addition is Red Hat Trusted Artifact Signer, which allows developers to cryptographically sign and verify application artifacts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Red Hat Trusted Software Supply Chain gets updated with three new offerings - SD Times\" \/>\n<meta property=\"og:description\" content=\"The first new addition is Red Hat Trusted Artifact Signer, which allows developers to cryptographically sign and verify application artifacts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/\" \/>\n<meta property=\"og:site_name\" content=\"SD Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SDTimesD2\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-18T18:54:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-18T18:58:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/2023_SecuritySupplyChain-Deploy-continuously.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1259\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jenna Barron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:site\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Barron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/\"},\"author\":{\"name\":\"Jenna Barron\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786\"},\"headline\":\"Red Hat Trusted Software Supply Chain gets updated with three new offerings\",\"datePublished\":\"2024-04-18T18:54:08+00:00\",\"dateModified\":\"2024-04-18T18:58:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/\"},\"wordCount\":272,\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/2023_SecuritySupplyChain-Deploy-continuously.jpg\",\"keywords\":[\"Red Hat\",\"security\",\"Supply Chain Security\"],\"articleSection\":[\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/\",\"url\":\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/\",\"name\":\"Red Hat Trusted Software Supply Chain gets updated with three new offerings - SD Times\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/2023_SecuritySupplyChain-Deploy-continuously.jpg\",\"datePublished\":\"2024-04-18T18:54:08+00:00\",\"dateModified\":\"2024-04-18T18:58:40+00:00\",\"description\":\"The first new addition is Red Hat Trusted Artifact Signer, which allows developers to cryptographically sign and verify application artifacts.\",\"breadcrumb\":{\"@id\":\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/#primaryimage\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/2023_SecuritySupplyChain-Deploy-continuously.jpg\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/2023_SecuritySupplyChain-Deploy-continuously.jpg\",\"width\":1920,\"height\":1259},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sdtimes.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Red Hat Trusted Software Supply Chain gets updated with three new offerings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sdtimes.com\/#website\",\"url\":\"https:\/\/sdtimes.com\/\",\"name\":\"SD Times\",\"description\":\"Software Development News\",\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sdtimes.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sdtimes.com\/#organization\",\"name\":\"SD Times\",\"url\":\"https:\/\/sdtimes.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"width\":225,\"height\":90,\"caption\":\"SD Times\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SDTimesD2\",\"https:\/\/x.com\/sdtimes\",\"https:\/\/www.linkedin.com\/company\/sdtimes\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786\",\"name\":\"Jenna Barron\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/image\/b4be3423b187642936e62f121111345e\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g\",\"caption\":\"Jenna Barron\"},\"description\":\"Jenna Barron is News Editor of SD Times.\",\"url\":\"https:\/\/sdtimes.com\/author\/jennifer-sargent\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Red Hat Trusted Software Supply Chain gets updated with three new offerings - SD Times","description":"The first new addition is Red Hat Trusted Artifact Signer, which allows developers to cryptographically sign and verify application artifacts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/","og_locale":"en_US","og_type":"article","og_title":"Red Hat Trusted Software Supply Chain gets updated with three new offerings - SD Times","og_description":"The first new addition is Red Hat Trusted Artifact Signer, which allows developers to cryptographically sign and verify application artifacts.","og_url":"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/","og_site_name":"SD Times","article_publisher":"https:\/\/www.facebook.com\/SDTimesD2","article_published_time":"2024-04-18T18:54:08+00:00","article_modified_time":"2024-04-18T18:58:40+00:00","og_image":[{"width":1920,"height":1259,"url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/2023_SecuritySupplyChain-Deploy-continuously.jpg","type":"image\/jpeg"}],"author":"Jenna Barron","twitter_card":"summary_large_image","twitter_creator":"@sdtimes","twitter_site":"@sdtimes","twitter_misc":{"Written by":"Jenna Barron","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/#article","isPartOf":{"@id":"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/"},"author":{"name":"Jenna Barron","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786"},"headline":"Red Hat Trusted Software Supply Chain gets updated with three new offerings","datePublished":"2024-04-18T18:54:08+00:00","dateModified":"2024-04-18T18:58:40+00:00","mainEntityOfPage":{"@id":"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/"},"wordCount":272,"publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"image":{"@id":"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/2023_SecuritySupplyChain-Deploy-continuously.jpg","keywords":["Red Hat","security","Supply Chain Security"],"articleSection":["Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/","url":"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/","name":"Red Hat Trusted Software Supply Chain gets updated with three new offerings - SD Times","isPartOf":{"@id":"https:\/\/sdtimes.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/#primaryimage"},"image":{"@id":"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/2023_SecuritySupplyChain-Deploy-continuously.jpg","datePublished":"2024-04-18T18:54:08+00:00","dateModified":"2024-04-18T18:58:40+00:00","description":"The first new addition is Red Hat Trusted Artifact Signer, which allows developers to cryptographically sign and verify application artifacts.","breadcrumb":{"@id":"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/#primaryimage","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/2023_SecuritySupplyChain-Deploy-continuously.jpg","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/2023_SecuritySupplyChain-Deploy-continuously.jpg","width":1920,"height":1259},{"@type":"BreadcrumbList","@id":"https:\/\/sdtimes.com\/security\/red-hat-trusted-software-supply-chain-gets-updated-with-three-new-offerings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sdtimes.com\/"},{"@type":"ListItem","position":2,"name":"Red Hat Trusted Software Supply Chain gets updated with three new offerings"}]},{"@type":"WebSite","@id":"https:\/\/sdtimes.com\/#website","url":"https:\/\/sdtimes.com\/","name":"SD Times","description":"Software Development News","publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sdtimes.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sdtimes.com\/#organization","name":"SD Times","url":"https:\/\/sdtimes.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","width":225,"height":90,"caption":"SD Times"},"image":{"@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SDTimesD2","https:\/\/x.com\/sdtimes","https:\/\/www.linkedin.com\/company\/sdtimes\/"]},{"@type":"Person","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786","name":"Jenna Barron","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/image\/b4be3423b187642936e62f121111345e","url":"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g","caption":"Jenna Barron"},"description":"Jenna Barron is News Editor of SD Times.","url":"https:\/\/sdtimes.com\/author\/jennifer-sargent\/"}]}},"_links":{"self":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/54325"}],"collection":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/users\/752"}],"replies":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/comments?post=54325"}],"version-history":[{"count":4,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/54325\/revisions"}],"predecessor-version":[{"id":54330,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/54325\/revisions\/54330"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media\/54326"}],"wp:attachment":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media?parent=54325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/categories?post=54325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/tags?post=54325"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/coauthors?post=54325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}