Briefing: Tech Teams
Key phases in a software escrow setup
Quick tip: Organized inputs = faster setup
How to deposit assets into escrow
Organize your software assets
Note: The escrow agreement defines what your client expects to recover in a worst-case scenario — so what you deposit should match that. In most cases, this means including everything needed to install or restore the software from scratch, even for someone unfamiliar with the system.
Action checklist:
Choose your deposit method
You can upload assets manually or connect your repositories for automated syncing. Choose the method that fits your development cycle best:
Note: Once you select how you’ll deposit, the platform walks you through exactly what to do so setup is quick and easy.
Action checklist:
Upload, tag, and activate your escrow
Once your assets are ready, upload them to the Codekeeper platform using your chosen deposit method. Each asset must be tagged by type (e.g., source code, database, configuration) to ensure your deposit meets the requirements in your agreement.
After everything is uploaded and properly labeled, you can activate your escrow. This finalizes your setup and initiates your escrow protection for solid software resilience.
Note: You'll also have the option to generate a Validated escrow certificate — a confirmation that your setup meets baseline escrow standards. For more in-depth verification (e.g., for audits or enterprise compliance), you can request an advanced review.
Action checklist:
What Codekeeper handles for you
Our key responsibilities
Your software resilience support team