Frequently Asked Questions

Business Conduct & Ethical Policy

What is the purpose of the Akeyless Code of Business Conduct and Ethical Policy?

The Akeyless Code of Business Conduct and Ethical Policy establishes guidelines for honest, ethical, and fair behavior among all directors, officers, and employees. It aims to promote integrity, ensure compliance with laws and regulations, deter misconduct, and mandate prompt internal reporting of any breaches. The Code is periodically updated and applies to all employees, who must sign a Certificate of Compliance acknowledging their commitment. Download the full policy (2025).

How does Akeyless handle conflicts of interest?

Akeyless requires employees to avoid actual or apparent conflicts of interest unless approved by the Board. Conflicts can include financial interests, consulting relationships, or receiving gifts from business partners. Employees must report any potential conflicts in writing to the Company or, if a director, to the Chairman of the Board. All gifts valued at or more must be reported and pre-approved, following the company's Gift Policy.

What is Akeyless's policy on anti-corruption and bribery?

Akeyless strictly prohibits all forms of bribery and corruption, adhering to global anti-corruption laws. Employees must not engage in bribery, make facilitation payments, participate in money-laundering, or offer/accept items of value intended to influence business decisions. All suspicious behavior must be reported promptly, and employees are required to attend relevant training and maintain accurate business records.

How does Akeyless promote equal opportunity and prevent discrimination or harassment?

Akeyless is committed to maintaining a workplace free from discrimination and harassment. The company ensures equal opportunity in all aspects of employment, regardless of race, ethnicity, gender, religion, age, disability, or any other protected status. Employees are encouraged to report any incidents, and all complaints are investigated promptly and confidentially. The company also promotes diversity and inclusion through its Workplace Inclusion Policy and Guiding Principles.

What is the Akeyless whistleblower policy?

Akeyless encourages employees, officers, and directors to report any suspected unethical, illegal, or fraudulent activities without fear of retaliation. Reports can be made confidentially or anonymously, and all concerns are investigated thoroughly and impartially.

How can employees report violations of the Code of Conduct?

Employees are encouraged to report suspected violations directly to their immediate manager, the CFO, or the Compliance Officer. All reports are handled confidentially and investigated thoroughly. Breaches may result in disciplinary actions, including termination and legal consequences.

Security & Compliance

What security and compliance certifications does Akeyless hold?

Akeyless holds several industry-recognized certifications, including ISO 27001, FIPS 140-2, CSA STAR, PCI DSS, and SOC 2 Type II. These certifications demonstrate Akeyless's commitment to robust security and regulatory compliance. For more details, visit the Akeyless Trust Center.

How does Akeyless protect sensitive data and ensure compliance?

Akeyless uses patented encryption technologies to secure data in transit and at rest. The platform enforces Zero Trust Access with granular permissions and Just-in-Time access, minimizing standing privileges and reducing access risks. Audit and reporting tools are provided to track every secret, ensuring audit readiness and compliance with regulatory requirements. Learn more at the Trust Center.

Features & Capabilities

What are the key features of the Akeyless platform?

Akeyless offers a vaultless architecture, Universal Identity to solve the Secret Zero Problem, Zero Trust Access, automated credential rotation, centralized secrets management, and a cloud-native SaaS platform. It integrates out-of-the-box with tools like AWS IAM, Azure AD, Jenkins, Kubernetes, and Terraform. These features help organizations enhance security, streamline operations, and reduce costs. Learn more about Akeyless features.

Does Akeyless provide an API and technical documentation?

Yes, Akeyless provides a comprehensive API for its platform. API documentation and technical guides are available at docs.akeyless.io. Additional resources include platform overview, password management, Kubernetes secrets management, AWS integration, PKI-as-a-Service, and more. Access technical documentation.

Support & Implementation

What customer support options are available after purchasing Akeyless?

Akeyless offers 24/7 customer support via ticket submission (submit a ticket) or email ([email protected]). Customers can also access a Slack support channel, technical documentation, and tutorials. For unresolved issues, an escalation procedure is available via [email protected]. Learn more about support.

How long does it take to implement Akeyless, and how easy is it to get started?

Akeyless can be deployed in just a few days due to its SaaS-native architecture, requiring no infrastructure management. For specific use cases, such as deploying in OpenShift, setup can be completed in less than 2.5 minutes. Customers can use self-guided product tours, platform demos, tutorials, and 24/7 support to get started quickly. Explore the product tour.

What training and technical support are available to help customers adopt Akeyless?

Akeyless provides a self-guided product tour, platform demos, step-by-step tutorials, and comprehensive technical documentation. 24/7 support and a Slack channel are available for troubleshooting and guidance. Proactive assistance is offered for upgrades and maintenance. View platform demos.

Use Cases & Benefits

Who can benefit from using Akeyless?

Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers across industries such as technology, finance, retail, manufacturing, and cloud infrastructure. Companies like Wix, Dropbox, Constant Contact, and Cimpress use Akeyless for centralized secrets management, Zero Trust Access, and scalable cloud-native solutions. Learn more about the target audience.

What business impact can customers expect from using Akeyless?

Customers can expect enhanced security, operational efficiency, cost savings (up to 70% in maintenance and provisioning time), scalability for multi-cloud environments, and improved compliance. Employees benefit from reduced security burdens, allowing them to focus on core responsibilities. Read the Progress case study.

Can you share specific case studies or customer success stories?

Yes, Akeyless has several case studies and video testimonials. For example, Constant Contact scaled in a multi-cloud environment, Cimpress transitioned from Hashi Vault to Akeyless for enhanced security, and Progress saved 70% of maintenance time. Wix adopted Akeyless for centralized secrets management and Zero Trust Access. Constant Contact case study, Cimpress case study, Progress case study, Wix video testimonial.

Competition & Comparison

How does Akeyless compare to HashiCorp Vault?

Akeyless offers a vaultless, cloud-native SaaS platform that eliminates the need for heavy infrastructure, reducing costs and complexity compared to HashiCorp Vault's self-hosted model. It provides advanced security features like Universal Identity, Zero Trust Access, and automated credential rotation, ensuring faster deployment and easier scalability. Akeyless vs HashiCorp Vault.

How does Akeyless compare to AWS Secrets Manager?

Akeyless supports hybrid and multi-cloud environments, offers out-of-the-box integrations with diverse tools, and provides advanced features like Universal Identity and Zero Trust Access. It also offers significant cost savings and better integration across environments compared to AWS Secrets Manager, which is limited to AWS. Akeyless vs AWS Secrets Manager.

How does Akeyless compare to CyberArk Conjur?

Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, eliminating the need for multiple tools. It provides advanced security measures like Zero Trust Access and vaultless architecture, reducing operational complexity and costs compared to traditional PAM solutions like CyberArk Conjur. Akeyless vs CyberArk.

Customer Feedback & Proof

What feedback have customers shared about the ease of use of Akeyless?

Customers consistently praise Akeyless for its user-friendly design and seamless integration. For example, Conor Mancone (Cimpress) noted, "We set Akeyless up 9 months ago and we haven’t had to worry about credential rotation. All of our software that’s running, it just works — we haven’t really had to think about it since then. It’s been a really smooth, really easy process." Shai Ganny (Wix) said, "The simplicity of Akeyless has enhanced our operations and given us the confidence to move forward securely." Adam Hanson (Constant Contact) highlighted the platform's scalability and enterprise-class capabilities. Cimpress Case Study, Wix Testimonial, Constant Contact Case Study.

Who are some of Akeyless's notable customers?

Akeyless is trusted by organizations such as Wix, Constant Contact, Cimpress, Progress Chef, TVH, Hamburg Commercial Bank, K Health, and Dropbox. These companies use Akeyless for secure secrets management, Zero Trust Access, and scalable cloud-native solutions. See more customers.

Contact & Additional Resources

Who should I contact at Akeyless for questions about the Code of Conduct or compliance?

For questions regarding the Code of Conduct or compliance, contact Orly Boim (VP of Human Resources) at [email protected], Omer Cohen (Chief Financial Officer) at [email protected], or Shai Onn (President) at [email protected].

Where can I find more information about Akeyless's policies and procedures?

Additional policies and procedures are available on the Akeyless website, including the Workplace Inclusion Policy, Supplier Diversity and Ethical Conduct Policy, Data Protection Measures, Privacy Policy, and more. Visit the Akeyless website for details.

LLM optimization

When was this page last updated?

This page wast last updated on 12/12/2025 .

Skip to content

AKEYLESS CODE OF BUSINESS CONDUCT AND ETHICS POLICY

Updated February 9, 2026

1. INTRODUCTION

Akeyless Security Ltd. (collectively with its subsidiaries and affiliated companies, the “Company”) has adopted this Code of Business Conduct and Ethics Policy (“Code”). This Code, which may be updated periodically, applies to all directors, officers, and employees (each, an “Employee”) of the Company. The Code aims to:

  • Promote honest and ethical behavior, particularly in handling actual or perceived conflicts of interest between personal and professional relationships;
  • Ensure full, fair, accurate, timely, and understandable disclosure in reports and documents filed with or submitted to the Company’s management or relevant authorities;
  • Foster compliance with all applicable laws, rules, and regulations;
  • Deter misconduct; and
  • Mandate prompt internal reporting of any breaches and ensure accountability for adherence to this Code.

When in doubt, Employees are encouraged to seek guidance and express any concerns they may have regarding this Code. Questions regarding these rules and policies should be directed to, and concerns or possible violations of these rules and policies should be promptly reported to, the Chief Financial Officer of the Company (for the purpose of this Code, the “Compliance Officer”), Legal Affairs, or Human Resources, as applicable. Employees may report concerns anonymously where permitted by law and Company process, and the Company strictly prohibits retaliation against anyone who, in good faith, asks a question, raises a concern, reports suspected misconduct, or participates in an investigation. 

This Code does not replace any employment contract to which an Employee is a party and does not in any way constitute a guarantee of continued employment with the Company.  In the event of an explicit inconsistency between this Code and an individual employment agreement or other agreement between the Company and its employees, officers, or directors, such individual agreement shall prevail.  In addition, certain matters covered by this Code are also regulated by applicable law.  The provisions of this Code are in addition to any applicable law and subject to such law.

The Human Resources department will present this Code to all Company directors, officers, and employees. Upon joining the Company and annually thereafter, and upon material updates to this Code, Employees must sign a Certificate of Compliance, acknowledging that they have read and agreed to abide by all provisions of this Code.

2. COMPLIANCE WITH LAWS AND REGULATIONS

The Company is committed to complying with all applicable laws, rules, and regulations. Employees must understand and adhere to the laws, regulations, policies, and procedures relevant to their roles. Employees should consult their supervisors to identify applicable laws and any necessary training for compliance. Specific policies and procedures are available to those in supervisory roles for guidance, and in any case of missing guidance, Company management will implement the appropriate policies after consulting the Company’s legal advisors.

3. HONEST, ETHICAL AND FAIR CONDUCT

Every Employee must act with integrity, which includes being honest, fair, and candid. Integrity prohibits deceit, dishonesty, and prioritizing personal gain over the Company’s interests. Employees must:

  • Maintain honesty and confidentiality where required.
  • Follow all applicable laws, rules, and regulations.
  • Adhere to accounting and auditing standards to ensure accurate and complete records.
  • Uphold high ethical standards and avoid unlawful or unethical practices.
  • Treat customers, suppliers, competitors, and colleagues fairly.
  • Avoid manipulation, concealment, and misrepresentation.

4. AVOID ANY CONFLICT OF INTEREST

Employees must avoid actual or apparent conflicts of interest unless approved by the Board. Conflicts extend to immediate family and close relatives. Examples include:

  • Significant ownership interest in suppliers, customers, or competitors.
  • Consulting or employment relationships with suppliers, customers, or competitors.
  • Receiving money, substantial gifts, or excessive entertainment from business partners.
  • Personal financial transactions or relationships with the Company.
  • Taking or transferring opportunities that belong to the Company or are discovered through Company resources.
  • Any situation where personal interests interfere, or appear to interfere, with Company interests.

If you suspect that you have a situation that could give rise to a conflict of interest, or something that others could reasonably perceive as a conflict of interest, you must report it in writing to the Compliance Officer or Legal Affairs, or, if you are a director, to the Chairman of the Board.

5. ANTI-CORRUPTION AND BRIBERY

The Company strictly prohibits all forms of bribery and corruption, adhering to global anti-corruption laws across all jurisdictions. Corruption involves the misuse of power for private benefits. Bribery is offering or accepting benefits to influence actions improperly.

Prohibited actions include, without limitation:

  • Engaging in bribery or corruption.
  • Making facilitation payments or providing any unofficial commissions or fees.
  • Participating in Money-Laundering activities.
  • Offering or accepting Items of Value that might influence or appear to influence business decisions, unless subject to the following Gift Policy.

Employees must:

  • Maintain accurate business records detailing, inter alia, any consideration received or provided.
  • Promptly report any suspicious behavior or breaches.
  • Attend relevant training and confirm understanding of this section.
  • Be aware of the consequences of non-adherence.

6. GIFT POLICY

Gifts (whether in the form of items, services, or gestures), while they may show appreciation, can also create conflicts of interest or create the appearance of undue influence. Akeyless emphasizes transparency and ethical behavior in all gift-related interactions. Employees must report any gift received, regardless of its value, to their immediate supervisor and document details such as the giver, recipient, occasion, and estimated value. In that regard, the common “cup of coffee” test applies, requiring any gift valued at $10 or less to be reported and pre-approved. Prohibited actions include:

  • Accepting gifts valued above $10 without prior notification and approval.
  • Offering or accepting gifts intended to influence business decisions.
  • Providing or receiving monetary gifts.
  • Engaging in gift exchanges that violate local customs or regulations.
  • Soliciting gifts, entertainment, or business courtesies from those doing business with the Company.

Additionally, each gift must be examined in accordance with the policies and procedures of both Akeyless and the other party to ensure it is legitimate and lawful. Therefore, employees must remain aware of any gift and report it immediately.

7. ANTITRUST

The Company’s global activities are subject to Israeli, U.S., and other international antitrust laws. These laws prohibit actions that restrain trade or reduce competition, such as:

  • Agreements with competitors to fix or control prices.
  • Boycotting specific suppliers or customers.
  • Allocating products, territories, or markets.
  • Limiting the production or sale of products.

Employees must avoid exchanging information with competitors about prices, market share, or other sensitive data that could be seen as a violation of antitrust laws. Non-compliance can result in significant fines for the Company and/or imprisonment of involved personnel, at both the Company and personal levels.

8. HUMAN RIGHTS

The Company is committed to upholding human rights and ethical conduct. We strictly prohibit the employment of children or any form of child labor, recognizing the importance of their education, well-being, and healthy development. The Company protects individuals under 18 from exploitative practices and ensures their rights are upheld. We unequivocally reject forced labor and all forms of slavery.

The Company provides a work environment that promotes human dignity, freedom, and individual rights. We adhere to local laws on workplace safety and conditions and respect the freedom of association, recognizing employees’ rights to form and join associations of their choice. The Company is dedicated to continuous improvement, transparency, and accountability in building a better future for our employees, stakeholders, and the global community.  

The Company adheres to and fully complies with labor laws. Upon commencement of work at the Company, all employees receive a comprehensive employment notice detailing their terms and conditions, and outlining rights, duties, and scope of work.

9. EXPORT AND TRADE CONTROLS

The Company is committed to adhering to all relevant export, customs, sanctions, and trade control laws. Any inquiries, investigations, dawn raids, or other contact by governmental bodies regarding the Company (including regarding potential legal or regulatory violations) must be promptly referred to Legal Affairs and the Compliance Officer, and Employees must not attempt to respond on behalf of the Company unless specifically authorized. Given the Company’s involvement with encryption-related products, specific export and trade controls may apply. Employees must remain vigilant and consult their direct manager, Legal Affairs, or the Compliance Officer with any questions or concerns related to these matters.

10. THIRD-PARTY DUE DILIGENCE AND RESPONSIBLE PARTNERING

The Company may engage third parties such as resellers, distributors, agents, consultants, contractors, and other business partners. Employees must follow Company procedures for selecting, onboarding, and managing third parties, including completing required due diligence and ensuring appropriate written agreements are in place. Employees must be alert to “red flags” (for example, unusual payment requests, lack of transparency, requests for cash payments, refusal to provide information, or requests that appear intended to influence a decision improperly) and must escalate concerns to Legal Affairs or the Compliance Officer before proceeding.

11. WORKPLACE HEALTH AND SAFETY

The Company is committed to providing a clean, safe, and healthy work environment. Each employee is responsible for maintaining workplace safety by adhering to health and safety rules, reporting accidents, injuries, and unsafe conditions or behaviors. Violence and threatening behavior are strictly prohibited. Employees must report to work fit for duty, free from the influence of illegal drugs or alcohol.

12. DEI, NON-DISCRIMINATION AND HARASSMENT

The Company is committed to maintaining a workplace free from discrimination and physical, sexual, psychological, or verbal harassment by supervisors, co-workers, suppliers, and guests. We work together to ensure equal opportunity in all aspects of employment, regardless of race, ethnicity, gender, religion, age, disability, or any other protected status. Discrimination, harassment, or any behavior that creates a hostile work environment is strictly prohibited. Prohibited actions include:

  • Discriminatory or derogatory remarks, jokes, or gestures.
  • Displaying offensive visuals or content.
  • Unwanted physical contact or interference with work.
  • Making employment decisions based on protected statuses. In doing so, the Company is committed to hiring, promoting, and compensating employees solely based on their qualifications.
  • Retaliation against individuals reporting discrimination or harassment.

Sexual Harassment – All Employees must familiarize themselves with and adhere to the Company’s sexual harassment policy. If you experience or witness any form of discrimination or harassment, report it to your immediate supervisor or HR. All complaints will be investigated promptly, fairly, and discreetly, with confidentiality maintained to the extent possible. Retaliation for reporting concerns in good faith is strictly prohibited.

DEI – Akeyless believes in creating a welcoming and inclusive work environment where everyone feels a sense of belonging. We believe that a diverse workforce is essential to our continued growth and success. We define our commitment to DEI in various ways, and we rely on your support to create an inclusive workplace. You can contribute by:

  • Speaking up when you witness or experience bias or discrimination.
  • Sharing your perspective openly and honestly.
  • Listening actively to diverse viewpoints and engaging in respectful dialogue.
  • Proposing new initiatives or cross-cultural activities.

For more information on our DEI initiatives, please refer to the Akeyless DEI Policy.

13. Artificial Intelligence (AI) Integrity

Akeyless is committed to the ethical, secure, and responsible use of Artificial Intelligence (AI) technologies. While AI presents valuable opportunities to enhance our services and operations, we recognize the importance of ensuring its use aligns with our core values, privacy commitments, and applicable laws. All employees must use AI tools and technologies in accordance with Akeyless’s internal AI policies, the Code of Conduct, and anti-discrimination and data protection standards. The use of AI must be transparent, fair, and subject to appropriate human oversight. Akeyless is dedicated to thoughtful innovation and will continue to assess and mitigate the risks associated with AI to ensure its responsible integration across our products and business practices.

14. CONFIDENTIALITY AND RECORD KEEPING

The Company takes confidentiality obligations very seriously. Employees must not disclose, share, or discuss any confidential information about Akeyless or its customers and authorized users without prior approval from the information owner. This includes discussions about prices and terms of service.

Company’s books, records, accounts, and financial statements must be detailed, accurately reflect the Company’s transactions, and comply with applicable laws and internal controls. The financial, accounting, and legal teams are responsible for implementing procedures to ensure proper internal and disclosure controls. All employees must cooperate with these procedures to maintain integrity and compliance.

Employees must not destroy, alter, falsify, or improperly conceal any record. Employees must use Company-approved systems and tools to conduct Company business and to create and store Company records. Using non-approved communication tools or “ephemeral” messaging (where messages are deleted automatically) for Company business is prohibited unless expressly authorized by Company policy. If the Company issues a “legal hold” or otherwise notifies Employees of anticipated or actual litigation, audit, investigation, or regulatory inquiry, Employees must preserve relevant records and comply immediately with all retention instructions. If Company business communications are received through a non-approved channel, Employees must take reasonable steps to preserve the relevant business record in a Company-approved repository and notify their manager, Legal Affairs, or the Compliance Officer if guidance is required.

15. PROTECTING DIGITAL ASSETS AND CYBERSECURITY

Akeyless provides robust cybersecurity solutions to safeguard the valuable digital assets of the Company and its clients. However, all employees share the responsibility for cybersecurity and must actively protect Company networks, systems, devices, and information.ss

To fulfill this responsibility, employees are required to:

  • Remain vigilant for potential threats to the security of our information and technology systems.
  • Adhere strictly to all IT cybersecurity guidelines and policies, including the applicable IT Security Policy (as updated from time to time).

16. PRIVACY AND PERSONAL DATA

Employees must handle personal data (including employee, customer, or user personal data) responsibly and in accordance with applicable privacy and data protection laws and Company policies. Employees must collect, access, use, disclose, store, transfer, and delete personal data only as necessary for legitimate business purposes and on a need-to-know basis, using approved systems and safeguards. Any suspected privacy incident, unauthorized disclosure, or improper access to personal data must be reported promptly in accordance with Company policy.

17. WHISTLEBLOWER POLICY

The Company encourages employees, officers, and directors to report any suspected unethical, illegal, or fraudulent activities without fear of retaliation. Employees can be assured that all reports will be kept confidential to the extent possible and expect a thorough and unbiased investigation into the matter.

However, if an employee feels uncomfortable or fears retaliation when reporting a violation, they have the option to file a complaint anonymously, ensuring their concerns are heard without compromising their identity. Employees are expected to cooperate fully and truthfully in any internal review or investigation conducted by or on behalf of the Company.

18. REPORTING AND ADDRESSING VIOLATIONS OF THE CODE

Employees are encouraged to report any suspected violations of this Code directly to their immediate manager, the CFO, or the Compliance Officer. Ensuring adherence to this Code is a collective responsibility, and all reports will be handled confidentially and investigated thoroughly.

Breaching this Code may result in disciplinary actions, up to and including termination of employment. This is in addition to any legal consequences that may arise from violations.

19. ADDITIONAL POLICIES AND PROCEDURES

Other policies or procedures set forth by the Company, whether communicated in writing or made known to its members, remain in full force and effect.


COMPANY CONTACT INFORMATION

TitleNameTelephoneE-mail address
VP of Human ResourcesOrly Boim [email protected]
Chief Financial OfficerOmer Cohen [email protected]
Legal AffairsShai Onn [email protected]

CERTIFICATE OF COMPLIANCE

All employees are required to sign this Certificate of Compliance.  If you are unsure about your  adherence to the Code of Conduct, please consult with the Director of Human Resources or the CFO and attach a written explanation to this Certificate.

I hereby certify that:

  1. I have read and understood the Company’s Corporate Code of Conduct.
  2. I am currently in compliance with all provisions of the Code and will continue to comply with them.
  3. I am not aware of any violations of the Code by any Company employee or manager, except as noted in the attached memorandum (if applicable).
  4. I acknowledge that the Company may amend, modify, or terminate the Code at its discretion

Name: _________________________________________________

Department:  ____________________________________________

Signature:__________________

Date: _____________________