<img height="1" width="1" style="display: none" alt="" src="https://px.ads.linkedin.com/collect/?pid=1098858&amp;fmt=gif">
Briefing Background
Security Portal

Codekeeper Trust Center

securityPortalLogos

Updates

Oct 27, 2025
How Codekeeper Made Software Verification More Affordable
For years, software verification was a luxury; something only enterprises with massive compliance budgets could justify.
Read more
Jul 11, 2025
The Codekeeper Advantage
In the last few years, our world has grown more dependent on software.
Read more
Jul 11, 2025
Codekeeper V5 Is Here: The Modern Solution for Software Resilience
Every business runs on software.
Read more
View all updates

Compliance and Certifications

transparent_iso_27001_2022
ISO 27001
transparent_iso_27018_2019
ISO 27018
transparent_iso_27017_2015
ISO 27017
transparent_iso_9001_2015
ISO 9001
transparent_soc
SOC 1
transparent_soc
SOC 2
transparent_soc
SOC 3
transparent_pci_dss
PCI DSS Level 1
transparent_csa
CSA

Overview

Welcome to the Codekeeper Trust Center

Codekeeper specializes in software resilience. We offer ISO 27001 certified software escrow services that protect systems and ensure business continuity. For over a decade, we've preserved the source code, data, and dependencies that power critical business operations, healthcare systems, financial services, and essential infrastructure. 

What We Do

Codekeeper acts as a neutral and trusted third party between software vendors and their clients. We store source code deposits in resilient digital vaults, perform verification testing, and provide access to escrowed materials only when specific release conditions are triggered. Our automated platform handles daily deposit synchronization, maintains version histories, and generates audit trails for all activities.

Our Security Foundation

We protect your source code with the same vigilance we demand for our own systems. Security isn't something we add — it's how we're built. Every deposit is guarded with AES-256/512 encryption, multi-factor authentication, and 24/7 monitoring across redundant data centers.

Reviewed and Trusted By

Airbus
Axxiome
British American Tobacco
circle-bayer
circle-eu-parliament
circle-general-motors
Gorenje
Intuit
circle-louis-vuitton
NASA
Nascar
Nestlé
PepsiCo
Pfizer
PwC
Siemens
Slate Digital

Controls

folder-lock
Product and Data Security
End-to-end encryption
Integrations
Multi-factor authentication
Audit logging
View more
globe-lock
Network and Infrastructure Security
Hosting
Data centers
Anti-DDoS
Network perimeter security
View more
users-round
Organizational Security
Team member training
Incident response readiness
Business continuity and disaster recovery plan
Dedicated information security team
HR security
View more
shield-ban
Access Controls
Principle of least privilege
Deposit access restrictions
Release condition verification
View more
triangle-alert
Risk Management
Regular risk assessments
Security monitoring
Risk treatment
View more
scale-1
Legal
Privacy Policy
Terms of Service
Data Processing Agreement
View more
book-lock
Data Privacy and Compliance
Data privacy overview
Data retention procedures
View more

Quick Summary

file-badge-1
ISO 27001:2022 certified
file-badge-1
SOC 2 aligned operations
file-badge-1
Operates in line with GDPR
monitor
Has a formal mobile device management (MDM) program
shield-check
Annual independent internal and third-party audits
calendar-search
Continuous vulnerability testing with regular review cycles
calendar-search
Quarterly and annual internal compliance reviews
calendar-search
Quarterly access reviews
cloud-drizzle
Has incident response, business continuity, and disaster recovery plans — tested at planned intervals
credit-card
Has cyber insurance
door-closed
Has extensive internal information security policies & procedures
presentation-1
Security awareness training during onboarding and annually thereafter
users-round
Has a vendor management program with vendor security and compliance reviews

Documents

All
Public
Private

Get access to confidential security documents

Complete this form to request access to our confidential security and compliance documents.

Bulk download general security documents

Complete this form to access our publicly available security and compliance documents. (No NDA required.)

FAQs

Popular Questions
How does Codekeeper protect my source code?
Codekeeper implements defense-in-depth security with multiple protective layers. Beyond encryption and monitoring, we maintain complete deposit immutability — your code is never modified, only copied. 
Can I trust Codekeeper with my sensitive data?
Yes. Codekeeper has protected source code for over a decade without a security incident. We're ISO 27001:2022 certified by BSI and operate under GDPR standards globally. Your data is handled under strict need-to-know principles — we collect minimal information, encrypt everything, and our business model depends on maintaining your trust.
Does Codekeeper conduct regular security audits and updates?
Yes, we conduct regular security audits and updates to ensure that our platform remains secure and up-to-date with the latest industry standards and best practices.
FAQ Categories
globe-lock
General Security
12 answers
network
Organizational Information and Policies
4 answers
database-zap
Asset Management
3 answers
user-round-check
Human Resource Security
4 answers
lock
Physical and Environmental Security
1 answers
monitor-smartphone
Mobile and Remote Working Security
1 answers
messages-square
Communications and Operations Management
4 answers
pointer
Access Control
4 answers
wrench
Information Systems Acquisition, Development, and Maintenance
3 answers
mail-warning
Information Security Incident Management
5 answers
refresh-cw
Business Continuity Management
3 answers
file-badge
Compliance
2 answers
users-round
Vendor Management
8 answers
triangle-alert
Risk Management
4 answers
shield-check
Encryption and Data Protection
8 answers
git-compare
Network Security
3 answers
file-lock
Vulnerability Management and Threat Detection
3 answers

Let's build bulletproof software resilience together.