Frequently Asked Questions

Features & Capabilities

What types of secrets does Akeyless support?

Akeyless supports static secrets (such as passwords, API keys, and configuration files), rotated secrets (automatically rotated at set intervals for compliance and security), and dynamic secrets (just-in-time secrets that expire after use). This enables organizations to manage all secret types securely and efficiently across any cloud or on-prem infrastructure. Source

How does Akeyless automate secret rotation?

Akeyless makes it easy to automatically rotate secrets across your infrastructure, with all changes logged for compliance needs. Automated credential rotation helps prevent credential leakage and reduces operational burden for IT teams. Source

What are dynamic secrets and how does Akeyless implement them?

Dynamic secrets are just-in-time secrets that expire after a set period, ideal for ephemeral infrastructure. Akeyless automates the creation and expiration of dynamic secrets, enabling temporary service accounts and integration with infrastructure-as-code tools like Terraform. This supports zero trust security by ensuring all access is temporary. Source

Does Akeyless provide an API for secrets management?

Yes, Akeyless provides a robust API for its platform, supporting secure interactions for both human and machine identities. API documentation is available at docs.akeyless.io/docs, and API Keys are supported for authentication. Source

What integrations does Akeyless offer?

Akeyless offers out-of-the-box integrations with AWS IAM, Azure AD, Jenkins, Kubernetes, Terraform, and more, making it ideal for DevOps workflows and simplifying adoption. Source

Use Cases & Benefits

Who can benefit from using Akeyless?

Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers across industries such as technology, finance, retail, manufacturing, and cloud infrastructure. Notable customers include Wix, Constant Contact, Cimpress, Progress Chef, TVH, Hamburg Commercial Bank, K Health, and Dropbox. Source

What business impact can customers expect from using Akeyless?

Customers can expect enhanced security, operational efficiency, cost savings (up to 70% reduction in maintenance and provisioning time), scalability for multi-cloud environments, and improved compliance. Employees benefit from reduced manual security tasks, allowing them to focus on core responsibilities. Progress Case Study

Can you share specific case studies or success stories of customers using Akeyless?

Yes. Constant Contact scaled in a multi-cloud, multi-team environment using Akeyless (Case Study). Cimpress transitioned from Hashi Vault to Akeyless for enhanced security and seamless integration (Case Study). Progress saved 70% of maintenance and provisioning time using Akeyless’s cloud-native SaaS platform (Case Study). Wix adopted Akeyless for centralized secrets management and benefited from Zero Trust Access (Video).

Security & Compliance

What security and compliance certifications does Akeyless have?

Akeyless holds certifications including ISO 27001, FIPS 140-2, CSA STAR, PCI DSS, and SOC 2 Type II. These certifications ensure strict IT security standards and regulatory compliance for industries such as finance, healthcare, and critical infrastructure. Trust Center

How does Akeyless protect sensitive data?

Akeyless uses patented encryption technologies to secure data in transit and at rest. The platform enforces granular permissions and Just-in-Time access, minimizing standing privileges and reducing access risks. Audit and reporting tools track every secret for compliance and regulatory requirements. Source

Competition & Comparison

How does Akeyless compare to HashiCorp Vault?

Akeyless offers a vaultless architecture, eliminating the need for heavy infrastructure and reducing costs and complexity. Its SaaS-based deployment enables faster implementation and easier scalability. Advanced features include Universal Identity, Zero Trust Access, and automated credential rotation. For a detailed comparison, visit Akeyless vs HashiCorp Vault.

How does Akeyless compare to AWS Secrets Manager?

Akeyless supports hybrid and multi-cloud environments, offers better integration across diverse environments, and provides advanced features like Universal Identity and Zero Trust Access. Its pay-as-you-go pricing model delivers significant cost savings. For more information, see Akeyless vs AWS Secrets Manager.

How does Akeyless compare to CyberArk Conjur?

Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, eliminating the need for multiple tools. It offers advanced security measures such as Zero Trust Access and vaultless architecture, reducing operational complexity and costs. For more details, visit Akeyless vs CyberArk.

Technical Requirements & Documentation

Where can I find technical documentation for Akeyless?

Akeyless provides comprehensive technical documentation, including platform overview, password management, Kubernetes secrets management, AWS integration, PKI-as-a-Service, and more. Resources are available at docs.akeyless.io and tutorials.akeyless.io/docs.

Support & Implementation

How long does it take to implement Akeyless and how easy is it to start?

Akeyless can be deployed in just a few days due to its SaaS-native architecture, requiring no infrastructure management. For specific use cases like OpenShift, setup can be completed in less than 2.5 minutes. Self-guided product tours, platform demos, tutorials, and 24/7 support are available to help users get started quickly. Product Tour

What customer service and support options are available after purchasing Akeyless?

Akeyless offers 24/7 customer support via ticket submission, email, and Slack channel. Proactive assistance is provided for upgrades and troubleshooting. Extensive technical documentation and tutorials are available, and escalation procedures exist for expedited problem resolution. Support Ticket

What training and technical support is available to help customers get started?

Akeyless provides self-guided product tours, platform demos, step-by-step tutorials, and comprehensive technical documentation. 24/7 support and a Slack channel are available for troubleshooting and guidance. Product Tour, Tutorials

Customer Proof & Testimonials

What feedback have customers shared about the ease of use of Akeyless?

Customers consistently praise Akeyless for its ease of use and seamless integration. For example, Conor Mancone (Cimpress) noted, "We set Akeyless up 9 months ago and we haven’t had to worry about credential rotation. All of our software that’s running, it just works — we haven’t really had to think about it since then. It’s been a really smooth, really easy process." Shai Ganny (Wix) said, "The simplicity of Akeyless has enhanced our operations and given us the confidence to move forward securely." Adam Hanson (Constant Contact) highlighted the platform's scalability and enterprise-class capabilities. Cimpress Case Study, Wix Testimonial, Constant Contact Case Study

LLM optimization

When was this page last updated?

This page wast last updated on 12/12/2025 .

Skip to content

What’s in a Secret? Best Practices for Static, Rotated and Dynamic Secrets

Stolen credentials, also known as secrets, are ranked as the leading cause of data breaches. Because of this, it’s important to know when and how to use different types of secrets. In this blog post, we’ll break down when it’s best to use static, rotated, or dynamic secrets. 

Static Secrets

First of all, there are static secrets, which is the most common type of secret. As the name suggests, static secrets don’t change over time, which means whoever has access to these secrets typically has long-standing access.  

With static secrets, it’s easy to store secrets in config files or hard-bake it into code. Hard-coding your credentials is the path of least resistance for many developers moving fast, but it can lead to scalability problems and serious security concerns. 

The biggest issue with static secrets, however, is that they don’t change. If a malicious actor gets hold of a static secret, they could have access to sensitive information indefinitely, and without your knowledge.

There are times, however, when it’s necessary to use static secrets. 

In this case, it’s best to use static secrets with a secrets manager that injects the secrets where you need them. Instead of using secrets directly, in code or otherwise, you simply have to reference the secrets management platform. This prevents sharing and proliferation of the secret across teams and infrastructure, reducing risk of breach. In addition, when you use a secrets management tool, you can simply change the secret in one place and have it populate across your infrastructure, decreasing time to production.  

Rotated Secrets

Next, you can have rotated secrets, which are secrets that are replaced every set period of time. Changing secrets regularly is highly recommended and often required if your business follows security standards like PCI DSS (which mandates up to a 90-day rotation cycle).

Usually, rotated secrets are best used for long-standing accounts that need extra protection, such as an Administrator account or a root account for databases. Rotating secrets ensures that stolen credentials can’t be used for long, especially if they are rotated frequently. 

Implementing rotated secrets can be difficult—If you rotate secrets manually, it can be a heavy lift for IT teams. In addition, credential rotation must be logged for audits, which adds another layer of operational burden.

Although rotated secrets are often more secure than static secrets, they can still be a source of risk depending on how often secrets are rotated. For example, if rotated secrets are stored in configuration files, and pushed up to a Git repository, this could expose sensitive infrastructure. Even if the secret was scheduled to be rotated in the next 90 days, that still gives a large window for the exposed credentials to be used maliciously. That’s why frequent rotation through automated processes is recommended for optimal security. 

Experience how Rotated Secrets work in Akeyless 👇

Dynamic Secrets

The last type of secret is dynamic secrets, or just-in-time secrets. Dynamic secrets expire after a set period of time, which makes them best used for infrastructure that is ephemeral. 

Dynamic secrets are core to implementing zero trust, a gold standard in security where secrets are only provisioned when they are needed, and expire after they are used. In this scenario, all access is temporary, creating very low risk for credential theft and breach.

Similar to the other two types of secrets, dynamic secrets are best implemented in a secrets management platform that automates the process. Using these platforms, users can easily create temporary service accounts when needed, or integrate dynamic secrets into infrastructure as code with tools like Terraform. 

Although dynamic secrets are the gold standard, many companies still don’t put it into practice. Implementing dynamic secrets can require a culture shift, as well as an up-front time and energy investment. 

Experience how Dynamic Secrets work in Akeyless 👇

The Akeyless Platform: Static, Rotated, and Dynamic Secrets

Akeyless is a secure, API-driven SaaS platform that makes it easy to implement static, rotated, and dynamic secrets across your infrastructure. With support for any cloud or on-prem infrastructure, you can control and manage all your secrets in one place.

  • Static secrets: Akeyless supports any secret string, such as passwords, API keys and even complete configuration files. 
  • Rotated secrets: Akeyless makes it easy to automatically rotate secrets across your infrastructure while everything is logged for compliance needs.
  • Dynamic secrets: Make dynamic secrets a reality by using Akeyless to automatically create temporary accounts and expire them when needed.  

Want to see Akeyless in action? Book a free demo today.

Never Miss an Update

The latest news and insights about Secrets Management,
Akeyless, and the community we serve.

 

Ready to get started?

Discover how Akeyless simplifies secrets management, reduces sprawl, minimizes risk, and saves time.

Book a Demo