DevSecOps: Automating security in the development lifecycle
Learn how security teams are using DevOps principles and CI/CD pipelines to automate application security.
Automate application security with OpenShift Pipelines
In this self-paced tutorial, learn how to use OpenShift Pipelines to automate the deployment of your applications.
OpenShift Pipelines is a cloud-native, continuous integration and delivery (CI/CD) solution for building pipelines using Tekton. Tekton is a flexible, Kubernetes-native, open-source CI/CD framework that enables automating deployments across multiple platforms (e.g. Kubernetes, serverless, VMs, and so forth) by abstracting away the underlying details.

Learn DevSecOps

Extend common DevOps tools and processes with DevSecOps to improve app...

Why should developers learn Ansible? Find out how this simple yet powerful...

Learn to write, configure, and install a webhook that intercepts and...
DevSecOps is the way | Red Hat Livestreaming
In this monthly livestream series, learn how Red Hat weaves together DevOps and security automation to master DevSecOps. This show introduces you to Red Hat products used for DevSecOps and our security ecosystem partners to aid in your journey.
What developers need to know about security compliance
A developer's guide to security standards. Sharpen your understanding of key security standards and how they work together, then get tips for establishing responsibility for different aspects of your security infrastructure and incorporating security into your daily workflow—even when the requirements change from project to project.

Popular DevSecOps resources



Improve deployment processes and outcomes by applying machine learning in...

Learn how to create a Kubernetes-native CI/CD pipeline by installing Tekton,...

The basic steps of container security involve securing the build environment,...

Learn about the tools Red Hat has available to implement GitOps workflows....