<img height="1" width="1" style="display: none" alt="" src="https://px.ads.linkedin.com/collect/?pid=1098858&amp;fmt=gif">
Software Escrow

What is software escrow?

Unprotected software is under constant threat. Vendors fail, maintenance lapses, systems fall out of compliance, and code that worked fine yesterday stops working tomorrow — often with no warning and no obvious path forward. That exposure is real and largely invisible until something goes wrong.

Software escrow is how you protect against it.

hero-what-is-software-escrow

What is software escrow?

Software escrow is a legal arrangement where a software vendor deposits their source code and related materials with a neutral third-party agent. If the vendor goes out of business, fails to maintain the software, or breaches the agreement, the escrow agent releases those materials to the customer so the software can continue to be maintained and operated. It's one of the most direct ways to build software resilience into a business: keeping the software you depend on protected, accessible, and usable no matter what.
pillar-what-is-software-escrow

Types of software escrow

Software escrow takes several forms, and the right arrangement depends on how your software is built and hosted.

Software Escrow product icon

Traditional/On-premises software escrow

The original model, and still the most common. If you're running software installed on its own infrastructure — a custom ERP, a proprietary trading platform, or any other business-critical application — this is the arrangement that protects you. The vendor deposits the source code, documentation, and everything needed to maintain the software with an escrow agent. If something goes wrong with the vendor, the beneficiary gets access to those materials and can keep the software running.
SaaS Escrow product icon

SaaS escrow

Most software today isn't installed anywhere; it runs in the cloud, and you access it through a browser. That changes what needs to be protected. SaaS escrow goes beyond source code to cover the full environment: deployment configurations, databases, hosting infrastructure, and the dependencies needed to stand the application back up somewhere else. It's more complex than traditional escrow, but so is the risk of losing access to a cloud service you depend on.
Continuity Escrow product icon

Continuity escrow

Traditional escrow is reactive; it's triggered after something goes wrong — a vendor shuts down, goes insolvent, or stops supporting the software. Continuity escrow is proactive. Rather than releasing code or data for recovery, it maintains payments on the hosting platforms, APIs, and infrastructure dependencies your software relies on. This keeps services running uninterrupted while you find a permanent fix. For operations where any downtime is unacceptable, it's the difference between recovering from a failure and never experiencing one.
Software Escrow product icon

AI escrow

Most businesses running AI don't own the models, platforms, or infrastructure behind it; they depend on vendors for all of it. If those vendors change terms, shut down, or go under, the AI stack goes with them: prompts, fine-tuning, agent logic, workflows, all of it. Standard software escrow wasn't built for this. AI escrow protects the complete stack — model weights, training data, prompt engineering, deployment configurations, and workflow orchestration — so months of AI development can't be wiped out overnight by a vendor decision.
A note on terminology 

You'll come across several terms used interchangeably with software escrow.

  • Source code escrow refers specifically to the protection of source code and is the most common variant.
  • Technology escrow is broader, covering non-software assets like formulas, algorithms, and design documentation.
  • IP escrow focuses on intellectual property protection.
  • Escrow as a Service (EaaS), or SaaS escrow, describes cloud-based escrow delivery models.

But for most purposes, software escrow and source code escrow mean the same thing.

Why companies use software escrow

Most businesses don't think about software risk until something goes wrong. A vendor goes quiet, a support contract quietly lapses, or a company gets acquired, and the new owner has different priorities. By then, the leverage is gone.

The core problem is straightforward: software that isn't protected is under constant threat — from vendor failure, from neglect, from the quiet business risks that don't announce themselves until they've already done damage. If the vendor stops operating, bugs can't be fixed, changes can't be made, and the software can't be moved somewhere else. All you can do is start over.

That's expensive. Rebuilding mission-critical software from scratch takes time and money most organizations haven't budgeted for. In regulated industries, there are penalties to factor in too.

Software escrow gives you a fallback if things go wrong. The source code, documentation, and everything else needed to maintain the software independently are held securely by a neutral third party, ready to be released if the conditions in your agreement are met.

And it works both ways. For the businesses that depend on software, that's risk management. For the vendors who build it, it's also a commercial advantage. Offering escrow signals stability and seriousness, especially in enterprise and regulated markets where procurement teams routinely ask for it. It's one of the more credible ways a vendor can tell a prospective customer: we're not going anywhere, but if we do, you're protected.

Codekeeper works with vendors who want to offer that assurance at scale, without it becoming an administrative burden.

How software escrow works

A software escrow arrangement involves three parties: the software vendor (the depositor), the business using the software (the beneficiary), and a neutral escrow agent, like Codekeeper, who sits in the middle and manages everything.

pillar-how-to-set-up-software-escrow

1. The agreement

Everyone signs a legal agreement that sets out the rules: what gets deposited, how often it gets updated, and — critically — under what circumstances the materials can be released to the beneficiary. These release conditions are negotiated upfront and written into the contract. Nothing gets released without a qualifying event.

2. The deposit

The vendor deposits everything a competent developer would need to take over maintenance of the software. That typically includes source code (all versions and branches), build instructions and technical documentation, database schemas and data structures, third-party dependencies and libraries, configuration files and environment variables, and deployment scripts and CI/CD configurations. For SaaS applications, add hosting environment configurations, API specs, and data export procedures.

Deposits are updated on a regular schedule, often automatically, via integrations with the vendor's development tools and repositories, so the materials in escrow always reflect the current state of the software.

3. Secure storage 

The deposited materials are held in encrypted, geographically redundant storage by the escrow agent. Neither party can access them unilaterally — that's the whole point of a neutral third party.

4. Verification

Depositing materials gets you legal protection. Verification gives you certainty. Verification is the process of independently testing the deposited materials to confirm they're complete, current, and usable. It's an optional step, but an important one. More on this in the verification section below.

5. Release

If a qualifying event occurs, the beneficiary notifies the escrow agent and requests a release. The agent manages the process, including a notification period and a window for the vendor to dispute the claim if they believe the release conditions haven't been met. If the release proceeds, the materials are delivered securely to the beneficiary, who can then use them to maintain or rebuild the software independently.

The whole arrangement is designed to be hands-off under normal circumstances. Most software escrow agreements run quietly in the background for years. The value isn't in using it; it's in knowing it's there.

What triggers a release?

Release conditions are the specific events that give a beneficiary the right to request the deposited materials. They're defined in the escrow agreement upfront, and nothing gets released outside of them.

The most common release triggers are:

  • Vendor insolvency or bankruptcy
  • Cessation of business operations
  • Failure to provide maintenance or support
  • Material breach of the license agreement
  • A change of ownership where the new owner doesn't honor existing support obligations
  • An end-of-life announcement
  • Persistent failure to meet agreed SLAs after the issue has been raised in writing

These can be customized. Depending on the nature of the software and the relationship between the parties, additional triggers can be negotiated into the agreement, which is one reason it's worth getting software escrow terms right at the start.

When a beneficiary believes a release condition has been met, they notify the escrow agent and submit a formal request. The agent then notifies the vendor, who has a defined window to dispute the claim. If the vendor disputes it, the matter typically moves to arbitration. If they don't — or if the dispute is resolved in the beneficiary's favor — the escrow agent coordinates secure delivery of the materials.

This process protects vendors from bad-faith release requests while giving beneficiaries a clear, enforceable path when something genuinely goes wrong.

Note: Receiving the deposited materials doesn't transfer ownership of the software or grant new licensing rights. What the beneficiary gets is the right to use the source code and related materials for the specific purpose of maintaining and operating the application, as defined in the original license agreement. The vendor retains their intellectual property. Make sure your agreement reflects this clearly.

Who needs software escrow?

The short answer is anyone on either side of a software agreement where continuity matters needs software escrow.

If you're using software someone else built, the question is simple: Is it protected? Could your operations survive if this vendor disappeared tomorrow? If the honest answer is, "We'd be in serious trouble," that's the case for escrow. It's particularly relevant when:

  • Your software is mission-critical

  • Your systems have been customized for your specific environment or processes

  • Your vendor is small, venture-backed, or operating in a consolidating market

  • You've made a significant financial investment in the implementation

  • You're in a regulated industry where third-party software risk is subject to scrutiny

In financial services, healthcare, energy, the public sector, and legal services, regulators and auditors increasingly expect organizations to have documented controls around the software they depend on. Software escrow is one of the more concrete ways to demonstrate those controls exist. We cover the regulatory dimension in more detail below.

If you're a software vendor, escrow serves a different but equally practical purpose. Enterprise buyers — especially in regulated industries — often won't sign without it. Having software escrow in place removes a common objection late in the sales cycle, and signals something that's hard to fake: that you're confident enough in your own continuity to put it in writing.

When vendors enter a software escrow agreement, they take on specific obligations, such as depositing complete and current materials, keeping deposits updated as the software evolves, and providing warranties for what's held. In practice, this is less burdensome than it sounds. Codekeeper's integrations connect directly to most major repositories and CI/CD pipelines, so deposits happen automatically as part of the normal development workflow.

Software escrow and regulatory compliance

Regulators across jurisdictions are converging on the same expectation: know your software dependencies, document your controls, and be able to demonstrate resilience if a vendor relationship breaks down. No single regulation universally mandates software escrow by name, but several frameworks create obligations — around third-party risk management, business continuity, and exit planning — that escrow directly satisfies. For organizations in regulated industries, it's become less of an optional control and more of an assumed one.

The frameworks where this comes up most often:

solutions-dora

DORA (EU Digital Operational Resilience Act)

DORA requires financial entities in the EU to manage ICT third-party risk in a structured, documented way. This includes contractual provisions for exit strategies and the ability to continue operations if a critical technology provider fails. Software escrow is a tangible, auditable control that demonstrates your continuity arrangements don't depend on a vendor staying solvent. 

solutions-ffiec

FFIEC (US financial services)

The FFIEC's guidance on technology outsourcing and business continuity has long implied the kind of vendor risk controls that software escrow provides. Financial institutions subject to FFIEC examination are expected to demonstrate they can maintain critical systems through vendor disruptions — escrow is a recognized mechanism for doing that. 

solutions-ss22-21

PRA SS2/21 (UK banking) 

The Prudential Regulation Authority's supervisory statement on operational resilience sets expectations for UK-regulated firms around third-party dependencies and exit planning. Firms are expected to identify their important business services, map their software dependencies, and have arrangements in place to maintain continuity. Software escrow fits squarely within that framework. 

solutions-iso22301

ISO 22301 (Business continuity management) 

ISO 22301 requires organizations to identify and control risks that could disrupt their operations, including risks arising from third-party software dependencies. Software escrow is a recognized control within business continuity management systems, supporting both the planning and evidence requirements of the standard. 

solutions-iso27001

ISO 27001 (Information security management) 

Supplier relationships and third-party risk are a named control domain within ISO 27001. Software escrow contributes to those controls by ensuring that critical software assets remain accessible even if a supplier relationship ends unexpectedly. 

solutions-iso27001

SOC 2 

SOC 2 is an auditing framework that evaluates how organizations manage customer data and system availability across five trust service criteria. Availability is one of them. It t covers whether systems are operational and accessible to licensed parties, as agreed. Software escrow supports this by demonstrating that critical software has a continuity path, which is relevant both to vendors proving their own resilience to customers and to organizations proving they've managed their third-party software dependencies responsibly.

Escrow isn't a compliance silver bullet, but it's a practical, well-understood mechanism that satisfies a major part of what auditors are looking for.

Verification and certification

pillar-verification-and-certification-proving-your-escrow-works

Setting up a software escrow agreement gives you the legal right to access your software if something goes wrong. Verification goes a step further; it gives you the confidence that when you exercise that right, everything will work as expected.

The two things are related but distinct. An escrow agreement without verification is legally sound. But until someone has tested the deposited materials, you're taking on trust that the source code is complete, the build instructions are accurate, and the dependencies are all there.

Verification is an independent technical review of the deposited materials. The depth of that review depends on the level you choose.

Codekeeper offers three, plus a tailored option. Validated confirms that materials have been deposited and checks file integrity, a good starting point for lower-risk software. Verified adds automated analysis of the deposit's content and development activity, giving a clearer picture of what's been stored and how current it is. Certified adds expert human review and a full build test, where specialists compile and run the software from the deposited materials to confirm it produces a working application. Custom verification is tailored around the specific architecture and requirements of your software, for situations where standard tiers don't cover what you need.

Each level produces a Software Resilience Certificate — a formal document that records what was tested, what was found, and what the outcome was.

For vendors, it's a credible signal to prospective customers that your escrow arrangement is real and tested. For buyers in regulated industries, it's evidence that your continuity planning holds up under scrutiny. The further you go up the verification tiers, the stronger that evidence becomes.

How much does software escrow cost?

Software escrow is typically priced as an annual subscription, and the cost varies depending on the type of escrow, the verification level, the number of beneficiaries, and how complex the agreement is to set up. SaaS and continuity escrow involve more technical complexity than protection for traditional on-premises systems, so they cost more to run.

The more useful question isn't what software escrow costs, but what you're comparing it to. When a vendor fails without software escrow in place, rebuilding doesn't just mean finding new software; it means finding a new vendor, migrating data, retraining staff, and keeping the business running through all of it. That process runs to orders of magnitude more than an annual escrow subscription. In regulated industries, add potential penalties on top of that.

For most organizations, it ends up being one of the cheaper line items in their risk management budget.

See Codekeeper's pricing or talk to the team about the right arrangement for your situation.

How to set up software escrow

Activating software escrow protection is simpler than most people expect. The main effort is upfront, getting the agreement right and making sure the right materials are deposited. After that, it largely runs itself.

pillar-how-to-set-up-software-escrow

1. Map your dependencies

Which applications would cause serious operational or financial damage if they became unavailable? Which of those are built and maintained by a third party? That's your starting list. If you want a structured way to do this, Codekeeper's risk assessment walks you through it and produces a report you can act on.

2. Choose the right type of escrow

Once you know what you're protecting, the type of escrow follows naturally. On-premise software points to traditional source code escrow. Cloud-hosted applications need SaaS escrow. For systems where any downtime is unacceptable, continuity escrow is worth considering. If you're unsure, chat with Codekeeper's escrow specialists before committing to anything.

3. Agree on terms

The software escrow agreement needs to cover deposit schedules, release conditions, and each party's obligations. The right time to do this is when the license agreement is being negotiated, not after — it's much easier to get alignment before the contract is signed than to retrofit it once the software is already embedded in operations. If the conversation needs a nudge, Codekeeper can help facilitate.

4. Set your verification level

Choose based on how critical the software is and what level of assurance you need — for your own confidence and for any external stakeholders like auditors or regulators.

5. Automate your deposits

Codekeeper integrates directly with GitHub, GitLab, Bitbucket, and most major CI/CD pipelines, so new versions are deposited automatically as part of the normal development workflow. From there, schedule your verification reviews in line with your agreement terms and any audit cycles you're working to. The ongoing overhead is minimal.

Software protection starts with escrow

Software is always at risk — from vendor failure, insolvency, acquisition, or simply neglect. Most organizations don't think about that risk until they're already dealing with the consequences, and by then, the options are limited. Without protection in place, a vendor going dark or a cloud service shutting down can leave your operations exposed, your team scrambling, and your recovery timeline uncertain.

Software escrow is that protection. It's a secure, legally enforceable arrangement that ensures the source code, data, configurations, and everything else needed to keep your software running stays accessible and maintainable, whatever happens. It works across software types — traditional applications, cloud services, AI systems — and it gives everyone in the agreement the confidence that continuity is built in from the start.

pillar-cta-section
Is your software protected?
If your software isn't protected, activating software resilience is the right decision. Codekeeper makes it straightforward — for the businesses that depend on critical software and the vendors who build it.
Share this article
Share on facebook Share on linkedin Share on twitter Share on email

Frequently asked questions

What is the difference between software escrow and source code escrow? 
In most contexts, they mean the same thing. Source code escrow is the most common form of software escrow, focused specifically on protecting the source code of a software application. Software escrow is the broader term, which can also cover documentation, databases, deployment configurations, and other materials beyond the code itself. When people say "source code escrow," they're almost always referring to a standard software escrow arrangement.
Who is the escrow agent? 
The escrow agent is the neutral third party who holds the deposited materials and manages the escrow arrangement. Their role is to store the materials securely, ensure deposits stay current, and manage the release process if a triggering event occurs. Choosing an agent with a clear, auditable process and robust security practices matters because they're the one protecting your continuity plan.
What happens when a software vendor goes bankrupt? 
Vendor bankruptcy is one of the most common release triggers in an escrow agreement. When it's invoked, the beneficiary notifies the escrow agent, who manages the release process, including a notification period and any dispute resolution steps. Once the release is confirmed, the deposited materials are delivered to the beneficiary, who can use them to maintain or rebuild the software. The specifics depend on the agreement terms and the jurisdiction, so it's worth making sure your agreement covers this scenario clearly.
Can SaaS products be placed in escrow? 
Yes, though it's more complex than traditional on-premise escrow. SaaS escrow needs to include the code, deployment environment, databases, infrastructure configurations, and dependencies needed to stand the application up elsewhere. The goal is the same: ensuring the beneficiary can continue operating the software if the vendor fails. 
How often should escrow deposits be updated? 
Deposits should reflect the current production version of the software at all times — monthly at a minimum for actively developed software, and ideally with every significant release. The easiest way to handle this is through automated deposits, which sync directly with the vendor's development repositories so updates happen without any manual intervention.
Is software escrow legally enforceable? 
Yes. A software escrow agreement is a legally binding contract, and in most major jurisdictions, escrow arrangements are well-established in law, including in the context of vendor insolvency. In the US, bankruptcy law was amended in 1986 specifically to allow escrow agents to release deposits in the event of a software vendor's bankruptcy. The enforceability of specific terms depends on how the agreement is drafted, which is another reason it's worth getting it right up front.
How long does it take to set up a software escrow agreement? 
A straightforward escrow arrangement can be up and running within a few days once all parties are aligned. The main variable is how long it takes to agree on terms, which is why setting up escrow at the same time as the software license agreement tends to be faster and smoother. Codekeeper's standardized agreements are designed to minimize negotiation overhead without leaving anything important out.
Does software escrow cover AI models? 
Standard software escrow doesn't automatically cover AI-specific assets like model weights, training data, and inference infrastructure — these require a purpose-built arrangement. Codekeeper's AI escrow is designed specifically for this, protecting the full stack of what's needed to operate an AI system independently.

Let's build bulletproof software resilience together.