Skip to contentRed Hat

Navigation

AI
  • Our approach

    • News and insights
    • Technical blog
    • Research
    • Live AI events
    • Explore AI at Red Hat
  • Our portfolio

    • Red Hat AI
    • Red Hat Enterprise Linux AI
    • Red Hat OpenShift AI
    • Red Hat AI Inference Server New
  • Engage & learn

    • AI learning hub
    • AI partners
    • Services for AI
Hybrid cloud
  • Use cases

    • Artificial intelligence

      Build, deploy, and monitor AI models and apps.

    • Linux standardization

      Get consistency across operating environments.

    • Application development

      Simplify the way you build, deploy, and manage apps.

    • Automation

      Scale automation and unite tech, teams, and environments.

    • Virtualization

      Modernize operations for virtualized and containerized workloads.

    • Security

      Code, build, deploy, and monitor security-focused software.

    • Edge computing

      Deploy workloads closer to the source with edge technology.

    • Explore solutions
  • Solutions by industry

    • Automotive
    • Financial services
    • Healthcare
    • Industrial sector
    • Media and entertainment
    • Public sector
    • Telecommunications

Discover cloud technologies

Learn how to use our cloud products and solutions at your own pace in the Red Hat® Hybrid Cloud Console.

Products
  • Platforms

    • Red Hat AI

      Develop and deploy AI solutions across the hybrid cloud.

    • Red Hat Enterprise Linux

      Support hybrid cloud innovation on a flexible operating system.

      New version
    • Red Hat OpenShift

      Build, modernize, and deploy apps at scale.

    • Red Hat Ansible Automation Platform

      Implement enterprise-wide automation.

  • Featured

    • Red Hat OpenShift Virtualization Engine
    • Red Hat OpenShift Service on AWS
    • Microsoft Azure Red Hat OpenShift
    • See all products
  • Try & buy

    • Start a trial
    • Buy online
    • Integrate with major cloud providers
  • Services & support

    • Consulting
    • Product support
    • Services for AI
    • Technical Account Management
    • Explore services
Training
  • Training & certification

    • Courses and exams
    • Certifications
    • Red Hat Academy
    • Learning community
    • Learning subscription
    • Explore training
  • Featured

    • Red Hat Certified System Administrator exam
    • Red Hat System Administration I
    • Red Hat Learning Subscription trial (No cost)
    • Red Hat Certified Engineer exam
    • Red Hat Certified OpenShift Administrator exam
  • Services

    • Consulting
    • Partner training
    • Product support
    • Services for AI
    • Technical Account Management
Learn
  • Build your skills

    • Documentation
    • Hands-on labs
    • Hybrid cloud learning hub
    • Interactive learning experiences
    • Training and certification
  • More ways to learn

    • Blog
    • Events and webinars
    • Podcasts and video series
    • Red Hat TV
    • Resource library

For developers

Discover resources and tools to help you build, deliver, and manage cloud-native applications and services.

Partners
  • For customers

    • Our partners
    • Red Hat Ecosystem Catalog
    • Find a partner
  • For partners

    • Partner Connect
    • Become a partner
    • Training
    • Support
    • Access the partner portal

Build solutions powered by trusted partners

Find solutions from our collaborative community of experts and technologies in the Red Hat® Ecosystem Catalog.

Search

I'd like to:

  • Start a trial
  • Manage subscriptions
  • See Red Hat jobs
  • Explore tech topics
  • Contact sales
  • Contact customer service

Help me find:

  • Documentation
  • Developer resources
  • Skills assessments
  • Architecture center
  • Security updates
  • Support cases

I want to learn more about:

  • AI
  • Application modernization
  • Automation
  • Cloud-native applications
  • Linux
  • Virtualization
ConsoleDocsSupportNew For you

Recommended

We'll recommend resources you may like as you browse. Try these suggestions for now.

  • Product trial center
  • Courses and exams
  • All products
  • Tech topics
  • Resource library
Log in

Sign in or create an account to get more from Red Hat

  • World-class support
  • Training resources
  • Product trials
  • Console access

A subscription may be required for some services.

Log in or register
Contact us
  • Home
  • Resources
  • Maturity of software supply chain security practices 2024

Maturity of software supply chain security practices 2024

April 25, 2024•
Resource type: Overview
Download PDF

Security is essential for modern software supply chains

Software supply chain security helps to ensure integrity, confidentiality, and availability throughout software development life cycles. Through advanced practices, processes, and technologies, IT operations and development teams can prevent, detect, and respond to threats, vulnerabilities, and malicious activities. By systematically and proactively managing security throughout the entire software supply chain, organizations can improve resilience, manage costs, and increase customer satisfaction.

Commissioned by Red Hat and authored by SlashData, the Maturity of software supply chain security practices 2024 report1 assesses software supply chain security practices used by organizations worldwide.

Evaluate your software supply chain security

Protecting software supply chains can be significantly challenging due to their inherent complexity and global reach. Addressing these challenges requires a holistic approach that combines technological solutions, regulatory compliance, and stakeholder collaboration.

Here are 5 indicators that can help you understand the security of your software supply chain.

Assurance 

Software efficacy measures how consistently an application performs over time. Practices that increase software efficacy provide users with assurances of predictable, stable operations with minimal disruptions. For example, dependency management tools, open source software governance policies, and centralized risk management systems can help you predictably deliver effective applications and services. 

Key insight: While 51% of development teams ensure the trustworthiness of open source packages through either vulnerability and dependency management tools or responsible disclosure policies, only 11% of organizations currently have some form of open source software governance policy.

Transparency 

Transparent processes, clear guidelines, and standardized approaches for software development increase the integrity of applications and services. Software with high integrity performs without failures or errors. Consistent security scanning, software artifact authenticity validation, strong integrated development environment (IDE) and plug-in policy enforcement, and automated communication methods can increase software integrity and lead to improved customer satisfaction.

Key insight: 54% of developers actively implement vulnerability discovery practices in their own code, but only 20% apply standardized security practices each time a pull request is made.

Compliance 

Applying security practices and controls—in compliance with industry standards—to build systems can prevent vulnerabilities, ensure authenticity, and speed delivery of critical features. Additionally, using automation to deliver more frequent, security-focused builds reduces software rollbacks that delay delivery schedules and lead to dissatisfied customers. Detailed provenance, signed attestations, standardized base images, and automated image assessments can help you increase software delivery quality and frequency while remaining in compliance with regulatory requirements. 

Key insight: While 52% of developers apply mature software delivery performance practices in the build stage, 57% do not use build information to verify if pipeline compliance has been met.

Consistency

Automated build and deployment processes help deliver more consistent software while reducing the potential for errors and vulnerabilities. Continuous integration/continuous deployment (CI/CD) pipelines with automated, embedded security checks increase workflow efficiency, allowing you to deliver applications and services with minimal disruptions. And CI/CD pipeline features like security scans, digital signatures, and infrastructure as code (IaC) capabilities—along with dedicated workflow ownership—can mitigate security risks in your automated software delivery processes.

Key insight: 67% of development teams include multiple security practices in their CI/CD pipelines, helping to eliminate repetitive tasks and configuration drift. And 83% engage in pipeline security risk mitigation to support continuous deployment to an auditable, immutable state.

Resilience

Rapidly identifying and remediating threats and vulnerabilities at runtime is critical to delivering resilient, robust services across environments. Processes that let you promptly prioritize and respond to security issues according to severity—and without alert storms that can disrupt operations—limit users’ exposure to potential threats. For example, real-time protection mechanisms, comprehensive container management solutions, policy enforcement points, and continuous analysis of stored images help you increase resiliency and avoid critical IT incidents.

Key insight: While 53% of developers track container images according to mature security practices, only 15% scan their container images with high frequency.

Overall software supply chain security maturity

Survey responses from 5 areas of software supply chain security—along with an overall combined score— reflect the maturity of security processes for development organizations of all sizes and geographies.

Here are a few key insights from these survey results.

  • Developers at organizations in the elite maturity group engage in more mature security practices across all 5 areas, while those in the high maturity group score lower in only 1 area.
  • Organizations with more mature security practices have greater awareness of potential vulnerabilities and the associated risks for their customers.
Overall software supply chain security maturity
  • For many development organizations, investing in practices that help rapidly detect and remediate vulnerabilities can greatly improve their software supply chain security.

Developer assessment of organization security

As individuals, developers often engage in more software supply chain security practices than required by their organizations. Developer assessments of their organization’s software supply chain security can highlight gaps between an organization’s perceived and actual security practices.

Here are a few takeaways from this assessment.

  • While developers at organizations in the elite maturity group are aware that their organization engages in security-focused practices, they also focus on continuous improvement of their software supply chain security. 
  • Organizations with less mature practices are unaware of their exposure to vulnerabilities, while also overlooking potential security improvements.
Developer assessment of organization security
  • Developers participate in more mature security practices for activities under their control, while engaging in less mature practices at the organizational level.

Resolution of security vulnerabilities

Mature security practices help organizations rapidly identify and remediate existing vulnerabilities while minimizing the introduction of new threats into the software supply chain. An analysis of the vulnerabilities addressed by an organization can indicate the maturity of their security practices. 

Here are a few key points from this analysis.

  • Organizations that engage in more mature security practices resolve more vulnerabilities while giving their developers a greater awareness of security-related incidents. 
  • Mature practices are key to building more secure software, as developers who engage in more security practices are more proficient at identifying and addressing issues.
Resolution of security vulnerabilities
  • Many organizations with less mature security practices are unaware of vulnerabilities in their software supply chain and underestimate their risk exposure.

Impact of organization size on software supply chain security

Many factors—including corporate culture, technology resources, and regulatory concerns—affect how organizations operate. The relationship between organization size in number of employees and mature security practices illustrates the influence of these factors on software supply chain security. 

Here are several key insights from these results.

  • Larger organizations with more staff, greater financial resources, and dedicated security teams generally have more mature software supply chain security practices.
  • The largest enterprises engage in slightly less mature security practices, possibly due to inefficient corporate policies that slow adoption of new technologies and processes.
Impact of organization size on software supply chain security
  • Although small organizations have fewer resources, they can rapidly implement new practices that continuously improve their software supply chain security.

Learn more

Read the Maturity of software supply chain security practices 2024 report to see the complete survey results and learn how you can improve your software supply chain security. Then, discover how Red Hat® Trusted Software Supply Chain can help you implement security-focused components, processes, and practices in your software factory to prevent vulnerabilities during development and anticipate security issues at runtime. Learn more at red.ht/trusted.

  1. Dodd, Liam and Korakitis, Konstantinos. “Maturity of Software Supply Chain Security Practices 2024.” 18 April 2024.

Tags:Application development and delivery, Application modernization, Containers, DevOps, Security, Security automation

Red Hat logoLinkedInYouTubeFacebookX

Products & portfolios

  • Red Hat AI
  • Red Hat Enterprise Linux
  • Red Hat OpenShift
  • Red Hat Ansible Automation Platform
  • Cloud services
  • See all products

Tools

  • Training and certification
  • My account
  • Customer support
  • Developer resources
  • Find a partner
  • Red Hat Ecosystem Catalog
  • Documentation

Try, buy, & sell

  • Product trial center
  • Red Hat Store
  • Buy online (Japan)
  • Console

Communicate

  • Contact sales
  • Contact customer service
  • Contact training
  • Social

About Red Hat

Red Hat is an open hybrid cloud technology leader, delivering a consistent, comprehensive foundation for transformative IT and artificial intelligence (AI) applications in the enterprise. As a trusted adviser to the Fortune 500, Red Hat offers cloud, developer, Linux, automation, and application platform technologies, as well as award-winning services.

  • Our company
  • How we work
  • Customer success stories
  • Analyst relations
  • Newsroom
  • Open source commitments
  • Our social impact
  • Jobs

Select a language

  • 简体中文
  • English
  • Français
  • Deutsch
  • Italiano
  • 日本語
  • 한국어
  • Português
  • Español

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility