Frequently Asked Questions

Data Protection & Transfer Impact Assessment

What is the purpose of the Akeyless Personal Data Transfer Impact Assessment (TIA)?

The Akeyless Personal Data Transfer Impact Assessment (TIA) helps customers assess the impact of transferring personal data outside the European Economic Area (EEA) in compliance with the Schrems II ruling and EU data protection guidelines. It details the measures Akeyless takes to ensure equivalent protection for customer data transferred internationally. Source

How does Akeyless ensure the protection of personal data transferred outside the EEA?

Akeyless uses patented Distributed Fragments Cryptography (DFC) technology, which encrypts customer data using key fragments that are never combined. Only encrypted data leaves the customer environment, and only the customer can decrypt it. This ensures that transferred data remains protected and inaccessible to unauthorized parties. Source

What legal mechanisms does Akeyless rely on for data transfers from Europe?

Akeyless relies on the European Commission's Standard Contractual Clauses (SCCs) as a valid legal mechanism for transferring personal data from Europe to third countries. These are incorporated into Akeyless's Data Processing Agreement (DPA) with customers and sub-processors. Source

How does Akeyless address US surveillance laws in its data transfer processes?

Akeyless is not an electronic communication service provider (ECSP) subject to FISA 702 orders for upstream collection. For downstream requests, Akeyless reviews and challenges any government request for customer encrypted data to ensure it is lawful. To date, Akeyless has never received a US National Security Request for customer encrypted data. Source

What technical measures does Akeyless implement to protect transferred data?

Akeyless uses DFC technology to encrypt data with key fragments stored in separate locations, including one fragment in the customer's environment. Only the customer can decrypt the data, ensuring that even if data is accessed, it remains unreadable. Source

What compliance certifications does Akeyless maintain for data protection?

Akeyless maintains SOC 2 Type II, ISO 27001, and NIST FIPS 140-2 certifications, demonstrating adherence to international standards for security and data protection. Source

How does Akeyless handle onward transfers to sub-processors?

Akeyless requires all sub-processors to undergo a thorough diligence process, including review of their security policies and privacy programs. Akeyless remains accountable for customer data shared with sub-processors and provides a public list of sub-processors. Source

What organizational measures does Akeyless take to secure customer data?

Akeyless regularly audits its operations, policies, and procedures, maintains compliance programs, and provides periodic data protection training to employees. All staff sign confidentiality agreements and are bound by data security practices. Source

How does Akeyless comply with the EU-U.S. Data Privacy Framework (DPF)?

Akeyless Security USA Inc. is in the process of certifying its compliance with the EU-U.S. Data Privacy Framework (DPF), which ensures adequate protection for personal data transferred from the EU to the US. Once certified, Akeyless will publish its DPF status on its website. Source

Is data transferred to Akeyless Security Ltd. in Israel considered adequate under EU law?

Yes, transfers of customer data to Akeyless Security Ltd. in Israel are considered adequate under EU law, as Israel has an adequacy decision from the European Commission. Source

How often does Akeyless review its data transfer impact assessment and measures?

Akeyless regularly reviews and updates its data transfer impact assessment and protective measures to address changes in data privacy regulations and risk environments. Source

Where can I find Akeyless's Data Processing Agreement and sub-processor list?

Akeyless's Data Processing Agreement (DPA) is available at this link, and the list of sub-processors is available at this link.

What is the role of encryption in protecting data from US government access?

Encryption ensures that even if data is intercepted or accessed by US authorities under laws like EO 12333 or the CLOUD Act, the data remains unreadable without the decryption key, which is only held by the customer. Source

How does Akeyless respond to law enforcement requests for customer data?

Akeyless carefully reviews any law enforcement request for customer data to verify its lawfulness and appropriateness, and challenges requests when necessary, in accordance with its principles and contractual commitments. Source

What supplementary measures does Akeyless consider necessary for data transfers?

Based on its technical, contractual, and organizational measures, Akeyless considers that no additional supplementary measures are necessary at this time for data transfers outside Europe. Source

How does Akeyless ensure compliance with GDPR and other data protection laws?

Akeyless complies with GDPR and other data protection laws by implementing SCCs, maintaining robust technical and organizational measures, and providing detailed documentation and audit trails for customers. Source

What is the significance of the Schrems II ruling for Akeyless customers?

The Schrems II ruling requires that personal data transferred outside the EEA must be protected to an essentially equivalent level as within the EEA. Akeyless's measures, including encryption and SCCs, ensure compliance with this requirement. Source

How does Akeyless's DFC technology work to protect customer data?

DFC technology encrypts data using key fragments stored in different locations, with one fragment always in the customer's environment. The fragments are never combined, so only the customer can decrypt the data, ensuring maximum security. Source

What is included in Akeyless's Data Protection Measures?

Akeyless's Data Protection Measures include encryption, compliance with international standards, regular audits, employee training, and strict confidentiality agreements. Details are available at this page.

How does Akeyless ensure job control and employee compliance with data protection?

All Akeyless employees sign confidentiality agreements and receive periodic data protection training to ensure compliance with data security practices. Source

What is the role of the European Commission's adequacy decision for Israel in Akeyless's data transfers?

The European Commission's adequacy decision for Israel means that transfers of personal data to Akeyless Security Ltd. in Israel are considered to provide adequate protection under EU law. Source

How does Akeyless's compliance with international standards benefit customers?

Compliance with standards like SOC 2 Type II, ISO 27001, and FIPS 140-2 ensures that Akeyless provides robust security, regulatory compliance, and audit readiness for customers. Source

Features & Capabilities

What products and services does Akeyless offer?

Akeyless offers a cloud-native SaaS platform for secrets management, identity security, encryption, and key management. Key features include centralized secrets management, Zero Trust Access, Universal Identity, automated credential rotation, and out-of-the-box integrations with popular DevOps tools. Source

What is Distributed Fragments Cryptography™ (DFC) and how does it work?

DFC is Akeyless's patented technology that encrypts data using key fragments stored in separate locations. The fragments are never combined, and only the customer can decrypt the data, ensuring zero-knowledge encryption. Source

Does Akeyless support integrations with other platforms?

Yes, Akeyless supports a wide range of integrations, including AWS IAM, Azure AD, Jenkins, Kubernetes, Terraform, Splunk, Sumo Logic, Venafi, Sectigo, ZeroSSL, ServiceNow, Slack, and SDKs for Ruby, Python, and Node.js. Full list

Does Akeyless provide an API for developers?

Yes, Akeyless provides a comprehensive API for its platform, with documentation available at this link. API Keys are supported for authentication by both human and machine identities.

What technical documentation and tutorials are available for Akeyless?

Akeyless offers detailed technical documentation and step-by-step tutorials to assist with implementation and usage. These resources are available at Technical Documentation and Tutorials.

What are the key capabilities and benefits of the Akeyless platform?

The Akeyless platform offers vaultless architecture, Universal Identity, Zero Trust Access, automated credential rotation, out-of-the-box integrations, cloud-native SaaS scalability, and compliance with international standards. Benefits include enhanced security, operational efficiency, cost savings, scalability, and improved employee productivity. Source

Compliance & Certifications

Which compliance certifications does Akeyless hold?

Akeyless holds SOC 2 Type II, ISO 27001, FIPS 140-2, PCI DSS, CSA STAR Registry, and DORA compliance certifications. These demonstrate Akeyless's commitment to security, privacy, and regulatory compliance. Source

How does Akeyless help organizations meet compliance requirements?

Akeyless provides secure secrets management, audit trails, and adherence to standards like GDPR, ISO 27001, and SOC 2, helping organizations meet regulatory requirements and maintain audit readiness. Source

Use Cases & Industries

Who can benefit from using Akeyless?

Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers in industries such as technology, marketing, manufacturing, software development, banking, healthcare, and retail. Source

What industries are represented in Akeyless's case studies?

Industries represented include technology (Wix, Dropbox), marketing (Constant Contact), manufacturing (Cimpress), software development (Progress Chef), banking (Hamburg Commercial Bank), healthcare (K Health), and retail (TVH). Source

Customer Success & Implementation

How easy is it to implement Akeyless?

Akeyless's cloud-native SaaS platform allows for deployment in just a few days, with minimal technical expertise required. Customers benefit from demos, product tours, tutorials, and 24/7 support. Source

What feedback have customers given about Akeyless's ease of use?

Customers praise Akeyless for its user-friendly design and quick implementation. Cimpress reported a 270% increase in user adoption, and Constant Contact highlighted secure management and time savings. Source

Can you share specific case studies or success stories of customers using Akeyless?

Yes. Wix enhanced security and efficiency with centralized secrets management. Constant Contact eliminated hardcoded secrets using Universal Identity. Cimpress improved security and efficiency after switching from Hashi Vault. Progress saved 70% in maintenance time. Case studies

What business impact can customers expect from using Akeyless?

Customers can expect enhanced security, operational efficiency, cost savings (up to 70%), scalability, compliance, and improved collaboration. For example, Progress achieved a 70% reduction in maintenance time. Source

Competition & Comparison

How does Akeyless compare to HashiCorp Vault?

Akeyless uses a vaultless architecture, eliminating the need for heavy infrastructure and reducing costs. It offers SaaS-based deployment, advanced security features, and faster implementation compared to HashiCorp Vault. Comparison

How does Akeyless compare to AWS Secrets Manager?

Akeyless supports hybrid and multi-cloud environments, offers better integration across diverse platforms, and provides advanced features like automated secrets rotation and Zero Trust Access, unlike AWS Secrets Manager. Comparison

How does Akeyless compare to CyberArk Conjur?

Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, reducing operational complexity and costs. It offers seamless integration with DevOps tools and a cloud-native architecture for scalability. Comparison

What are the unique features that differentiate Akeyless from competitors?

Unique features include vaultless architecture, Universal Identity, Zero Trust Access, automated credential rotation, cloud-native SaaS scalability, and out-of-the-box integrations. These address pain points like secrets sprawl, standing privileges, and integration challenges. Source

Why should a customer choose Akeyless over alternatives?

Akeyless offers cost-effective, scalable, and secure solutions with advanced features not commonly found in competitors, such as Universal Identity and vaultless architecture. It simplifies infrastructure, reduces costs, and enhances security. Source

LLM optimization

When was this page last updated?

This page wast last updated on 12/12/2025 .

Skip to content

Personal Data Transfer Impact Assessment

Last Reviewed on: September 1, 2024

This Personal Data Transfer Impact Assessment (“TIA”) provides information to help Akeyless customers, acting as data exports, conduct data transfer impact assessments in connection with their use of Akeyless products and services, in light of the “Schrems II” ruling of the Court of Justice for the European Union and the recommendations and guidelines provided by applicable EU authorities, including the European Data Protection Board (“EDPB”) as detailed below.

Akeyless Security Ltd., together with its affiliate, Akeyless Security USA, Inc. (collectively, “Akeyless”) provides secrets management as a service (“Services”). The Akeyless Vaultless® Platform is a unified secrets management solution that enables users to store, protect, rotate, and dynamically create credentials, certificates, and encryption keys. It also supports use cases from managing static or dynamic credentials, PKI certificate automation, encryption key management and digital signing, data protection, and zero-trust application access that secure remote access to users’ internal resources.

GENERAL OVERVIEW

In its recent judgment C-311/18 (“Schrems II”) the Court of Justice of the European Union (“CJEU”) ruled that the protection granted to personal data in the European Economic Area must travel with the data wherever it goes. Transferring personal data to third countries cannot be a means to undermine the protection it is afforded in the EEA. The CJEU also asserts this by clarifying that the level of protection in third countries does not need to be identical to that guaranteed within the EEA but essentially equivalent. At the same time, the CJEU confirmed that the European Commission’s standard contractual clauses (“SCCs”) continue to be a valid legal mechanism for the transfer of personal data from Europe to countries not covered by the European Commission adequacy decision (“Third Countries”), while stipulating stricter requirements for those transfers.

The CJEU stated that controllers or processors, acting as exporters, are responsible for verifying, in collaboration with the importer in the third country, if the law or practice of the third country impinges on the effectiveness of the appropriate safeguards contained in the Article 46 GDPR transfer tools.

The Schrems II ruling has focused European attention on the breadth of law enforcement powers, particularly with respect to national security programs, that permit U.S. government agencies to engage in proactive surveillance.

Therefore, this TIA explains the measures taken by Akeyless to ensure that an equivalent level of protection exists for customer data that is transferred out of the EEA, Switzerland and the U.K. (collectively “Europe”) in connection with use of Akeyless Services. This document also provides an overview of the assurances made by Akeyless to protect its customers’ data from inappropriate disclosure to law enforcement and intelligence agencies.

For the avoidance of doubt, as transfer impact assessments and the specific supplementary measures to be taken, shall be conducted and reviewed by data exporters on a case-by-case, this TIA should not be used to assess customer specific use cases, as the impact of processing customer data depends on the context of data usage by the Customer and the Customer’s particular deployment of the Akeyless Services. Only our customers are in a position to know and independently assess such specific use cases. Customers are responsible for ensuring that their use of the Akeyless Services complies with their legal and contractual obligations.

FIRST STEP: KNOW YOUR TRANSFERS

Akeyless has a unique and patented technology known as “DFC” (which stands for Distributed Fragments Cryptography). The DFC technology allows for the complete encryption of customer data by using encryption key fragments, without ever combining them, thereby eliminating the existence of a complete encryption key anywhere or at any time. In addition, any encryption/decryption operation is done solely within the customer’s environment, as such, only encrypted data leaves the customer environment. Any data stored or transferred by Akeyless is completely encrypted where only the customer can decrypt it.

Where Akeyless processes customer encrypted data governed by European data protection laws as a data processor on behalf of our customers, Akeyless complies with its obligations under its Data Processing Agreement (“DPA”) available here, which incorporate the SCCs and provide the required information under the applicable data protection laws, including a detailed description of Akeyless’ processing of customer data (Annex I); a description of the technical and organisational measures taken by Akeyless (Annex II); and a list of all of our data sub-processors (Annex III) (such list is also available here where you can stay up-to-date on changes to such list).

STEP 2: IDENTIFY THE TRANSFER TOOL RELIED UPON

Where customer encrypted data originating from Europe is transferred between Akeyless group companies or transferred by Akeyless to third-party sub-processors located in Third Countries, Akeyless enters into DPA which incorporate the SCCs with those parties. Moreover, each sub-processor goes through a thorough cross-functional diligence process conducted by Akeyless, as detailed below under STEP 4 “onward transfers”.

STEP 3: ASSESS WHETHER THE TRANSFER TOOL RELIED UPON IS EFFECTIVE IN LIGHT OF THE CIRCUMSTANCES OF THE TRANSFER

US Surveillance Laws:

The following US laws were identified by the CJEU in Schrems II as being potential obstacles to ensuring essentially equivalent protection for personal data in the US:

  1. FISA Section 702 (“FISA 702”) – allows US government authorities to compel disclosure of information about non-US persons located outside the US for the purposes of foreign intelligence information gathering. This information gathering must be approved by the Foreign Intelligence Surveillance Court in Washington, DC.  In-scope providers subject to FISA 702 are electronic communication service providers (“ECSP”) within the meaning of 50 U.S.C § 1881(b)(4). FISA 702 authorizes “upstream” and “downstream” collection.

Upstream collection authorizes U.S. authorities to collect communications as they travel over the internet backbone. Akeyless does not provide such backbone services, but instead only carries traffic involving its own customers, and therefore is not eligible to receive the type of orders principally addressed in, and deemed problematic by, the Schrems II ruling. Downstream collection authorizes U.S. authorities to collect targeted data directly from ECSPs based in the U.S. FISA 702 requires an independent court to authorize a specific type of foreign intelligence data acquisition which is generally unrelated to commercial information. To the extent that Akeyless may be compelled to respond to such a targeted request for customer encrypted data, we will carefully review the request to verify it is lawful and challenge the request in accordance with Akeyless’ principles and contractual commitments on government access requests.

  1. Executive Order 12333 (“EO 12333”) – authorizes intelligence agencies (like the US National Security Agency) to conduct surveillance outside of the US. In particular, it provides authority for US intelligence agencies to collect foreign “signals intelligence” information, being information collected from communications and other data passed or accessible by radio, wire and other electromagnetic means. This may include accessing underwater cables carrying internet data in transit to the US. The EO 12333 does not rely on the compelled assistance of service providers, but instead appears to rely on exploiting vulnerabilities in telecommunications infrastructure.

Customer data can effectively be protected from this type of signals intelligence interception through security measures such as encryption. It is important to note that EO 12333 does not grant the U.S. government the ability to compel companies to provide assistance with the above activities, moreover it contains no authorization to compel private companies, such as Akeyless, to disclose personal data to US authorities and.

Additional information about these US surveillance laws can be found in the U.S. Privacy Safeguards Relevant to SCCs and Other EU Legal Bases for EU-U.S. Data Transfers after Schrems II whitepaper from September 2020. This whitepaper details the limits and safeguards pertaining to US public authority access data and was issued in response to the Schrems II ruling.

To date, Akeyless has never received a US National Security Request (including requests for access under FISA 702 or direct access under EO 12333) in connection with customer encrypted data.

  1. The CLOUD Act – only permits U.S. government access to data in criminal investigations after obtaining a warrant approved by an independent court based on probable cause of a specific criminal act. It does not allow U.S. government access in national security investigations, and it does not permit bulk surveillance. For more information on the CLOUD Act, review “What is the CLOUD Act?” by BSA Software Alliance outlining the scope of the CLOUD Act. To the extent that Akeyless may be compelled to respond to such a law enforcement request for customer data, we will carefully review the request to verify that it is lawful and appropriate, including with respect to the data sought and relevant jurisdiction, and, when necessary, challenge the request in accordance with Akeyless’ principles and contractual commitments on government access requests.

STEP 4: IDENTIFY THE TECHNICAL, CONTRACTUAL AND ORGANIZATIONAL MEASURES APPLIED TO PROTECT THE TRANSFERRED DATA

Akeyless provides the following technical measures to secure data:

  • Akeyless DFC technology – as explained above, Akeyless DFC technology allows for the complete encryption of customer data by using encryption key fragments, without ever combining them. The key fragments are stored in different locations on Akeyless’ cloud servers; however, one key fragment is stored in the customer’s internal environment. The decryption can only be done by the customer in the customers’ environment, thus, even if an order would require a hosting provider to provide Akeyless’ hosted data, the customer data would be encrypted without the ability to decrypt it.

As recognized by the EDPB on June 18, 2021 (“Recommendations 01/2020 on measures that supplement transfer tools to endure compliance with the EU level of protection of personal data”, available here), where encryption keys are retained solely under the control of the data exporter, or by an entity trusted by the exporter in the EEA or under a jurisdiction offering an essentially equivalent level of protection to that guaranteed within the EEA, the encryption performed is an effective supplementary measure.

Moreover, as recognized by the French National Commission on Informatics and Liberty (“CNIL“) in its decision on February 10, 2022 (available here) again Google Analytic, encryption is a technical measure providing  sufficient level of protection to personal data at transfer as long as the encrypted keys are not in the US as there is no actual potential access to the data by the US authorities.

  • Compliance with international standards – Akeyless is proud to maintain world-class compliance and security standards, including SOC 2 Type II and ISO 27001 compliance. In addition, Akeyless is the first secrets management solution to achieve National Institute of Standards and Technology (NIST) FIPS 140-2 validation, going above and beyond to keep your secrets safe.

Additional information regarding the security measures implemented by Akeyless in order to secure the customer data are detailed in Akeyless Trust Center available here and Akeyless Data Protection Measures page available here.

Akeyless’ contractual measures are set out in our DPA which incorporates the SCCs available here.

Akeyless’ organizational measures to secure data include:

  • Compliance programs – Akeyless’ operations, policies and procedures are audited regularly to ensure that it meets all standards expected of it as a cloud system provider. Compliance certifications and attestations are assessed by a third-party, independent auditor and result in a certification, audit report, or attestation of compliance. Akeyless’ systems and Services were audited and verified under the ISO 27001 and ISO 27701 certifications and the System and Organization Controls (SOC). If you wish to be provided with such certifications and reports please contact us at: [email protected]  
  • Onward transfers – whenever Akeyless shares customer encrypted data with its sub-processors, Akeyless remains accountable to customer for how it is used. Akeyless requires all service providers to undergo a thorough cross-functional diligence process to ensure our customers data receives adequate protection. This process includes a review of the data Akeyless plans to share with the sub-processors and the associated level of risk, the sub-processors’ security policies, measures, and third party audits, and whether the sub-processor has a mature privacy program that respects the rights of data subjects. We provide a list of our sub-processors on our sub-processors page available here.
  • Job control – All our employees are required to execute an employment agreement which includes confidentiality provisions as well as applicable provisions binding them to comply with applicable data security practices. Further, Akeyless provides periodic data protection training to all its employees.

STEP 5: PROCEDURAL STEPS NECESSARY TO IMPLEMENT EFFECTIVE SUPPLEMENTARY MEASURES

In light of the information provided in this TIA, including Akeyless’ practical experience dealing with government requests and the technical, contractual, and organizational measures Akeyless has implemented to protect customer data; Akeyless considers that the risks involved in transferring and processing European personal data in/to the US do not impinge on our ability to comply with our obligations under the SCCs (“data importer”) or to ensure that individuals’ rights remain protected. Therefore, no additional supplementary measures are necessary at this time.

STEP 6: RE-EVALUATE AT APPROPRIATE INTERVALS

Akeyless will review and, if necessary, reconsider the risks involved and the measures it has implemented to address changing data privacy regulations and risk environments associated with transfers of personal data outside of Europe.

ADEQUACY DECISION:

Notwithstanding the above, on July 10, 2023, the European Commission adopted its adequacy decision for the EU-U.S. Data Privacy Framework (“DPF”), entered into force on that day. The adequacy decision concludes that the US ensures an adequate level of protection – compared to that of the EU – for personal data transferred from the EU to US companies participating in the EU-U.S. Data Privacy Framework – without having to put in place additional data protection safeguards. As such, US companies can certify their participation in the DPF by committing to comply with a detailed set of privacy obligations. This could include, for example, privacy principles such as purpose limitation, data minimization and data retention, as well as specific obligations concerning data security and the sharing of data with third parties. The DPF will be administered by the US Department of Commerce, which will process applications for certification and monitor whether participating companies continue to meet the certification requirements.

Once a company has voluntarily decided to certify under the DPF, its effective compliance with the DPF principles is compulsory and enforceable by the US Federal Trade Commission (“FTC). Akeyless Security USA Inc. is in the process of publicly declaring its commitment to comply with the DPF principles, as part of its DPF certification application. Once completing the process and becoming part of the DPF list, Akeyless will certify and will publish such certification herein and on the website.

Akeyless Security Ltd. a private company incorporated under the laws of the State of Israel. Therefore, transfer of customer data to Akeyless are deemed adequate by the European Commission (Israel’s adequacy decision is available here.