Trust Red Hat

Last updated February 16, 2018

Customer data security and privacy—the Red Hat way

Red Hat is committed to securing and protecting customer data. As your trusted partner, you can be confident in the safeguards Red Hat has in place. The data security landscape is made up of the following:


Employees, vendors, partners, and customers need to understand their role in cybersecurity


Designed to secure your organization and investments across people and processes


Embedding processes into Red Hat's business helps identify vulnerabilities and remediate issues quickly

Our commitment

Red Hat employs a diverse, collaborative, cross-functional team of experts that focuses on security and privacy. The team includes public policy, legal, information security, product security, customer data security, and regulatory compliance experts.

The team is accountable for the security policies and processes, implementation of these policies and guidelines, and education and engagement with Red Hat customers.

Have questions or feedback?Contact Us


Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.