<img height="1" width="1" style="display: none" alt="" src="https://px.ads.linkedin.com/collect/?pid=1098858&amp;fmt=gif">
Briefing Background
Software Resilience Implementation Worksheet

Briefing: Compliance Officers

How to initiate a DD request with Codekeeper

FileInput

Submit your due diligence request

Send your compliance questionnaire or documentation request through to your Codekeeper sales or customer success contact.

Action checklist:

Submit due diligence questionnaires with clear requirements
Specify any portal access needs or formatting preferences (e.g., OneTrust, Whistic)
file-pen-line

Sign an NDA for full documentation access

If your request includes sensitive security information, we’ll ask for a signed NDA before sharing these materials. Once in place, we can provide comprehensive documentation, including our security assurance reports, ISMS summaries, information security policies, and specialized compliance artifacts.

Action checklist:

Submit your NDA promptly
Helpful links: Trust Center
Respond to clarification requests to avoid delays
Confirm documentation scope meets your organization’s needs
file-search-2

Review completed compliance docs

Once your documents are ready, we’ll send everything through secure channels and handle any follow-up questions.

Action checklist:

Review documents internally
Flag any missing or unclear details
Coordinate follow-ups with your Codekeeper contact

What Codekeeper handles for you

Our compliance team is committed to providing thorough, accurate responses to your DD requirements while protecting sensitive information through proper legal channels.

Our key responsibilities

clipboard-pen-line
1. Complete your due diligence questionnaires.
Files
2. Provide comprehensive compliance documentation.
handshake
3. Coordinate with our technical teams for specialized information when needed.
message-circle-question-mark
4. Respond to follow-up questions and requests for additional documentation.

Build required software resilience with Codekeeper

Codekeeper helps you meet resilience and third-party risk requirements in frameworks like ISO 27001, SOC 2, GDPR, HIPAA, DORA, and NIS2. Use our escrow solutions and software resilience certificates to prepare for audits, respond to vendor risk assessments, and demonstrate regulatory readiness.
file-questionmark
Not sure which regulations apply to you?
Take our Compliance Scan to identify relevant standards and risk areas.
workflow
Want to understand how software escrow fits into compliance?
Check out our Solutions Overview to see how Codekeeper addresses key regulatory requirements.
Certifications - ISO_9001_2015
Certifications - ISO_27001_2022
Certifications - ISO_27017_2015
Certifications - ISO_27018_2019
Certifications - SOC
Certifications - SOC
Certifications - SOC
Certifications - PCi
Certifications - CSA
Quick tip: Start with our Trust Center
Our Trust Center gives you direct access to all our security documentation and an easy way to request additional materials under NDA.

Your software resilience support team

Meet your dedicated Codekeeper concierge team. We'll be here to support you at each step:
roger_1
Account Manager
Roger from Sales
Robyn 1
Account Support
Robyn from Customer Support
Book a support briefing

Let's build bulletproof software resilience together.