Secure, auditable Red Hat RPM repositories for engineering teams
Engineering teams consuming RPM packages from the official RHEL registry face real supply chain risk. Cloudsmith gives you a controlled, private proxy layer in front of upstream Red Hat repositories - with CVE scanning, GPG signing, entitlement token access control, and full audit logs across every package install.
One registry, every artifact your Linux infrastructure depends on. Cloudsmith sits in front of RHEL and keeps your supply chain clean.
- Use Red Hat RPM + 30 other formats in one place
- Proxy and cache packages from upstream RHEL registries with full CVE scanning on every pull
- Centrally manage RPM packages alongside containers, Helm charts, and raw binaries
How we support Red Hat RPM
Why teams choose Cloudsmith for Red Hat RPM
Signs you're ready to switch to Cloudsmith for Red Hat RPM
Get started with Red Hat RPM on Cloudsmith
Frequently asked questions
Yes. You can configure Cloudsmith as an upstream proxy in front of any Red Hat repository, including the official RHEL registry and third-party RPM sources. Packages that are not already cached in your Cloudsmith repository are fetched from the upstream on demand, scanned, and optionally cached for future requests.
Yes. Vulnerability scanning is available for all supported packages in a repository. When enabled, every RPM package - whether uploaded directly or pulled through an upstream proxy - is scanned for known CVEs. You can set automated quarantine and block policies based on severity so that high-risk packages never reach your hosts.
Cloudsmith automatically signs RPM packages with a GPG key on upload. You can use Cloudsmith's managed signing key or provide your own custom GPG or RSA key. The public key is served alongside your repository configuration so that tools like yum, dnf, and zypper can verify package integrity on install.
Cloudsmith isolates your internal packages from public upstream registries. Locally uploaded packages always take precedence over upstream-proxied packages. By routing all installs through Cloudsmith, your build systems and hosts never reach a public registry directly, eliminating the namespace collision risk that enables dependency confusion attacks.
Cloudsmith supports all major RPM-based distributions, including Red Hat Enterprise Linux (RHEL), CentOS, Fedora, Amazon Linux, Rocky Linux, AlmaLinux, and openSUSE/SUSE Linux Enterprise. Setup configuration scripts are available for yum, dnf, and zypper package managers.
Cloudsmith supports entitlement token authentication and HTTP Basic Authentication for private repositories. Entitlement tokens can be scoped to read-only access, making them safe to use in CI pipelines and deployment scripts. You can also integrate with SAML, OIDC, and SCIM for enterprise identity management.
Yes. Cloudsmith captures full client and audit logs for every package request, giving you a timestamped, queryable record of which package versions were pulled, by which token, from which IP. When a CVE is disclosed, you can identify all affected hosts immediately rather than guessing at exposure.
Yes. Cloudsmith is a fully managed service with no infrastructure for you to operate. Teams migrating from self-hosted solutions such as Pulp, Spacewalk, or on-premises Nexus can point their yum or dnf configuration at Cloudsmith repositories and benefit from automatic scaling, 99.99% availability SLAs, and a global CDN without running a single server.
Cloudsmith uses elastic load balancing and a globally distributed CDN with 600+ points of presence to serve packages at low latency to any region. Capacity scales automatically with demand, so there are no instances to provision and no planned maintenance windows that affect package availability.
Yes. Cloudsmith's package analytics and audit logs provide the traceability data needed to support compliance programs. Every package in your repository has a full provenance record. Combined with vulnerability scanning results, this gives your security team the visibility required to respond to audits and maintain accurate software bills of materials.