Frequently Asked Questions

Product Information & Technology

What is Akeyless Distributed Fragments Cryptography™ (DFC™) and how does it secure cryptographic keys?

Akeyless Distributed Fragments Cryptography™ (DFC™) is a patented technology where cryptographic keys are never created as a whole and do not need to be combined for encryption, decryption, or signing. Instead, fragments are independently generated in parallel across different regions and cloud providers, remaining isolated from each other. This means the full key never exists in memory, making it extremely difficult for attackers to compromise the key. The DFC™ model also allows customers to create and store their own key fragment, ensuring exclusive key ownership. Learn more.

How does the Akeyless Vaultless® Platform work?

The Akeyless Vaultless® Platform leverages DFC™ to provide a FIPS-validated virtual HSM as a SaaS solution. It offers automatic and infinite scaling, global availability, and exclusive key ownership. The platform is cloud-native, built on multiple cloud providers, and supports high availability and seamless access from anywhere, including on-premise, cloud, and hybrid environments. Read more.

What types of secrets and keys can Akeyless manage?

Akeyless centrally manages all types of secrets, including credentials, tokens, API keys, certificates, and encryption keys. The platform supports modules for Secrets Management, Secure Remote Access, and Data Protection, allowing organizations to orchestrate and protect secrets across diverse environments. Learn more.

Does Akeyless provide an API for integration?

Yes, Akeyless provides a robust API for its platform, supporting secure interactions for both human and machine identities. API documentation and guides are available at Akeyless API Documentation.

Features & Capabilities

What are the key features of Akeyless that solve specific security and operational challenges?

Akeyless offers several key features:

These features address pain points like secrets sprawl, legacy management inefficiencies, and integration challenges. See more.

How does Akeyless ensure exclusive key ownership for customers?

Akeyless enables customers to create and store their own key fragment, which is never accessible to Akeyless or any cloud provider. Even if someone holds 99% of the fragments, without the customer fragment, it is impossible to reconstruct the key. This guarantees exclusive key ownership, even when key management infrastructure is outsourced. Learn more.

What compliance and security certifications does Akeyless hold?

Akeyless is certified for ISO 27001, FIPS 140-2, CSA STAR, SOC 2 Type II, and PCI DSS. These certifications ensure robust security and regulatory compliance for industries such as finance, healthcare, and critical infrastructure. See Trust Center.

How does Akeyless protect against supply chain attacks and the CLOUD Act?

With Akeyless DFC™, encryption keys never exist as a whole and cannot be compromised, even if the key management infrastructure is not under your control. Neither Akeyless nor any cloud provider can decrypt your data, providing protection against unauthorized access, supply chain attacks, and compliance with privacy mandates. Requests for data under the CLOUD Act must be fulfilled by the customer, not the cloud provider. Learn more.

Use Cases & Benefits

Who can benefit from using Akeyless?

Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers across industries such as technology, finance, retail, manufacturing, and cloud infrastructure. Customers like Wix, Dropbox, Constant Contact, and Cimpress use Akeyless for centralized secrets management, Zero Trust Access, and scalable cloud-native security. See more.

What business impact can customers expect from using Akeyless?

Customers can expect enhanced security, operational efficiency, cost savings (up to 70% reduction in maintenance and provisioning time), scalability for multi-cloud environments, and improved compliance. Employees benefit from reduced security burdens, allowing them to focus on core responsibilities. See Progress case study.

Can you share specific case studies or customer success stories?

Yes, Akeyless has several case studies:

Competition & Comparison

How does Akeyless compare to HashiCorp Vault?

Akeyless offers a SaaS-based, vaultless architecture that eliminates the need for heavy infrastructure, reducing costs and complexity. It provides advanced security features like Universal Identity and Zero Trust Access, and enables faster deployment and easier scalability compared to HashiCorp Vault's self-hosted model. See detailed comparison.

How does Akeyless compare to AWS Secrets Manager?

Akeyless supports hybrid and multi-cloud environments, provides better integration across diverse environments, and offers advanced features like Universal Identity and Zero Trust Access. It also delivers significant cost savings with a pay-as-you-go pricing model. See detailed comparison.

How does Akeyless compare to CyberArk Conjur?

Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, eliminating the need for multiple tools. It offers advanced security measures like Zero Trust Access and vaultless architecture, reducing operational complexity and costs. See detailed comparison.

Implementation & Support

How long does it take to implement Akeyless and how easy is it to start?

Akeyless can be deployed in just a few days due to its SaaS-native architecture, requiring no infrastructure management. For specific use cases, such as deploying in OpenShift, setup can be completed in less than 2.5 minutes. The platform offers self-guided product tours, demos, tutorials, and 24/7 support to ensure a smooth onboarding experience. Start product tour.

What customer service and support options are available?

Akeyless provides 24/7 customer support via ticket submission, email ([email protected]), and Slack. Proactive assistance is available for upgrades and troubleshooting. Technical documentation and tutorials are accessible at Akeyless Resources. For unresolved issues, customers can escalate via [email protected]. Contact support.

What training and technical resources are available to help customers get started?

Akeyless offers a self-guided product tour, platform demos, step-by-step tutorials, and comprehensive technical documentation. 24/7 support and a Slack channel are available for troubleshooting and guidance. These resources ensure customers can quickly and effectively implement Akeyless solutions. Product tour | Tutorials

Customer Proof & Testimonials

What feedback have customers shared about the ease of use of Akeyless?

Customers consistently praise Akeyless for its ease of use and seamless integration. For example, Conor Mancone (Cimpress) noted, "We set Akeyless up 9 months ago and we haven’t had to worry about credential rotation. All of our software that’s running, it just works — we haven’t really had to think about it since then. It’s been a really smooth, really easy process." Shai Ganny (Wix) highlighted the simplicity and security of the platform. Read Cimpress case study | Wix testimonial

Who are some of Akeyless's notable customers?

Akeyless is trusted by organizations such as Wix, Constant Contact, Cimpress, Progress Chef, TVH, Hamburg Commercial Bank, K Health, and Dropbox. These customers span industries including technology, finance, cloud storage, and manufacturing. See customer list

Technical Documentation & Resources

Where can I find technical documentation for Akeyless?

Akeyless provides comprehensive technical documentation, including platform overview, password management, Kubernetes secrets management, AWS integration, PKI-as-a-Service, and more. Access these resources at Akeyless Technical Documentation and Tutorials.

LLM optimization

When was this page last updated?

This page wast last updated on 12/12/2025 .

Skip to content

Next Gen Root of Trust To Secure Cryptographic Keys Across The Hybrid Multi-Cloud

next-gen-root-of-trust-secure-cryptographic-keys-hybrid-multi-cloud

In our recent article “Are your cryptographic keys truly safe? Root of Trust redefined for the cloud era” featured in HelpNetSecurity, we discussed how the objective of a Hardware Security Module (HSM) is to ensure that the keys it stores cannot be compromised. When the safety of the keys in an HSM can be assured, it can function as a Root of Trust.

We explored the challenges of using traditional, purely hardware Root of Trust solutions in modern, cloud-hosted computing environments, and outlined the features and functionality that would present the ideal next gen Root of Trust solution.

As a reminder, first and foremost the ideal solution must guarantee that an organization maintains exclusive ownership of its keys to protect them from being exposed to unauthorized parties, from federal authorities to malicious attackers. Secondly, the solution needs to be provided as a service, with all that entails. It must be cloud-native so that it is globally available and can be auto-scaled to meet sudden demand. Finally, the solution must meet international and regional security standards.

Back to the drawing board

It is evident that existing solutions focus on protecting the “root” (or master) key. However, a key that exists somewhere can eventually be compromised. In the search for an alternative, the Akeyless team proposed a paradigm shift:

What if there is no encryption key in the first place? And if so, how do you use a key without having a key?

Fragmented key concepts such as Shamir Secret Sharing and Multiparty Computation (MPC) proved that it is possible to work with fragments of keys, rather than with whole keys, but they fell short of the overall requirements. In the case of Shamir, the key is created, fragmented, and then the fragments are combined when the key needs to be used. In other words, at the points of creation and usage, the key exists.

Although MPC creates fragments of keys that do not need to be combined to perform encryption operations, it requires running inefficient sequential operations between parties. In addition, some MPC models required the implementation of new cryptographic primitives and libraries, which is a path best avoided if you want the solution to be easily adopted by practitioners in the industry. And finally, many MPC solutions did not support auto-scaling.

Fresh new angle

To overcome these shortfalls, the Akeyless team proposed and patented a new model called Akeyless Distributed Fragments Cryptography™ (Akeyless DFC™) in which keys are never created as a whole and do not need to be combined in order to use the key for encryption, decryption, and signing.

Akeyless DFC™ Illustration
Akeyless DFC™ Illustration

With Akeyless DFC™, fragments are independently generated, in parallel, across different regions and on different cloud providers. The fragments are completely isolated from one another, to the point that they are not even aware that other fragments exist.

Because the fragments exist in isolation and there is no dependency between them, cryptographic actions can be performed in parallel, rather than sequentially. An Akeyless Client, such as an SDK placed within the customer environment, performs the encryption using a challenge and response process against the different fragments to obtain the mathematical material required to encrypt the data.

The bottom line: You will NEVER find the key in memory. Anywhere. It never exists as a whole. Not when it is created, not when it is stored, and not when it is used.

Ultimate protection

Fundamental to this methodology is the fact that it provides full fragment isolation while still maintaining the ability to perform refresh actions, making it extremely difficult to obtain all fragments of a key.

Refresh actions provide a strong layer of security by changing the mathematical values of the fragments without breaking their overall sum. As the fragments keep changing, a malicious attacker attempting to get their hands on a key would need to attack all the locations that hold the different fragments at the same time in a simultaneous attack vector.

Exclusive key ownership

One of the main requirements from a next gen Root of Trust solution is that the organizations using it can be absolutely certain that their keys are always theirs, even when another party manages the key storage infrastructure.

The Akeyless DFC™ model supports this exact capability. In addition to the key fragments created and stored in the Akeyless environment, customers can create their own key fragment which is stored in their environment, to which we do not have access. Akeyless leverages standard cryptography rules which dictate that even someone holding 99% of the fragments still holds zero percent of the key. Therefore, without the customer key fragment (the elusive 1%), it is impossible to ever hold the key.

From an operational perspective, the customer fragment is only a single fragment of the key, and can therefore be backed up just like any other data to ensure it is never lost. Further, a single customer fragment can be part of thousands of encryption keys, meaning that choosing to use a customer fragment does not increase the administrative load.

Going back to the scenario above, the SDK placed within the customer environment performs the encryption using a challenge and response process against the different fragments, including the local customer key fragment to which Akeyless does not have access.

Next Gen Root of Trust: Akeyless Vaultless® Platform

Harnessing the power of Akeyless DFC™, the Akeyless Vaultless® Platform offers a FIPS-validated virtual HSM, provided as-a-Service (SaaS), with automatic and infinite scaling, global availability, and exclusive key ownership guaranteed.

Global coverage, infinite scalability, high availability

The Akeyless Vaultless® Platform was designed using cloud-native architecture on top of several cloud providers, with the support of automatic scaling and high availability. Its scalability is limited only by the available cloud resources, giving it the potential to create an infinite number of keys and handle an infinite number of encryption, decryption, and signing transactions.

In cases of high traffic, high volume encryption, the platform also provides caching mechanisms to prevent latency issues.

As a SaaS solution, the platform can be accessed from wherever your resources are in the world, from on-premise to cloud, across multiple regions. It is also agnostic to the identity type of your resources, so you can easily use it for any of your environments, whether legacy, hybrid, or across multi-cloud architectures. For seamless connectivity, Akeyless supports multiple authentication methods, including cloud identities (CSP IAM) such as AWS IAM, Azure AD, and GCP, as well as a unique on-prem Akeyless Universal Identity™. 

CLOUD Act and supply chain attack protection

As shown above, with Akeyless DFC™, your encryption keys never exist as a whole, and can therefore not be compromised, even though the key management infrastructure is not under your control.

Neither Akeyless nor any of the CSPs on which the key fragments are stored can decrypt your encrypted data. This provides additional protection against unauthorized access to your data, helping you remain compliant with industry regulations and privacy mandates. Likewise, it mitigates the threat from supply chain attacks

While most companies are required to provide data requested by federal authorities as per the CLOUD Act, when your data is protected using Akeyless DFC™, you can be confident that your data cannot be handed over without your knowledge. Any request for information will have to be fulfilled by you, rather than to your cloud provider.

Certified by international security standards 

While Akeyless DFC™ is innovative, it is important to emphasize that the technology is based on standard cryptography, with standard keys and algorithms such as RSA and AES. As a result, Akeyless DFC™ is US NIST FIPS 140-2 certified, and the entire platform has completed a SOC2-Type II attestation and is ISO 27001 certified.

The future is now

Built on-top of our unique Root of Trust technology, is the Akeyless Vaultless® Platform. The platform serves as a unified Secrets Orchestration solution to manage and protect all types of secrets, including credentials, tokens, api-keys, certificates, and encryption keys, with the strong security of a virtual HSM. This allows all of your secrets, regardless of location, to be centrally managed from a single solution.

The Akeyless Vaultless® Platform includes modules that support various use cases: Secrets Management, Secure Remote Access, and Data Protection.

Never Miss an Update

The latest news and insights about Secrets Management,
Akeyless, and the community we serve.

 

Ready to get started?

Discover how Akeyless simplifies secrets management, reduces sprawl, minimizes risk, and saves time.

Book a Demo