Enterprise-grade security for onchain assets
Ensure predictable, auditable, and resilient operations with verifiable security that puts your team in control.



















Manage your keys
Turnkey uses AWS Nitro Enclaves, a trusted execution environment that keeps every cryptographic operation isolated.
Hardened Key Security
Generate raw private keys and keep them safe with hardware isolated, institutional-grade security.
Trusted Transactions
Sign transactions with private keys exclusively within this trusted environment.
Flexible Custody
Custody keys in multiple ways — non-custodial, custodial, or hybrid — with flexible enclave architecture.


Reproduce your code
Full-source reproducibility ensures developers can verify the entire enclave software stack.
Auditable Code
Trace every line of code, dependency, and build step that produced the binary.
Reproducible Builds
Allow anyone to reproduce the same hash with deterministic builds.
Impenetrable Architecture
Prevent hidden changes, stealth dependencies or malicious insertions.
Verify your runtime
Remote attestation proves that the code running in a Turnkey enclave matches what you’ve verified.
Attested Binaries
Independent attestations for each enclave fingerprint the exact binary
Proven Runtime
Check that hash against our deterministically built source code.
Ensured Security
Ensure that every key operation is executed inside the intended trusted environment.
Policy your transaction
The policy engine enforces enclave-secured rules on every transaction and enables delegated access with built-in controls.
Policy engine
Enforce fine-grained rules directly inside hardware-isolated secure enclaves.
Protected Policy
Ensure rules will not be bypassed with our in-enclave security model
Modifiable Limits
Define limits by address, asset, size or approval flow
Ensured Enforcement
Prove all actions will follow your defined policies with verifiable, cryptographic proof
Delegated access
Safely enable scoped access to teammates, services, and AI-agents.
Controlled Sessions
Enforce sessions with strict expirations and scoped to your defined policy
Permissioned Access
Grant collaborators and agents controlled session access without exposing keys
Empowered Workflows
Power automation, integrations, and AI-driven workflows securely


Security from first principles.
Performant
Turnkey’s infrastructure adapts seamlessly as demand grows, ensuring <100ms signing latency to give applications the highest security without the cost.
Verifiable
With every critical operation verified, the code inside the enclave remains trustworthy. This ability to audit with complete transparency ensures a trust you can prove.
Secure
Secure enclaves protect keys and handle all signing and policy enforcement. Plus, consistent independent audits keep Turnkey accountable.
Turnkey vs. the competition
When it comes to crypto assets, security can’t be compromised. Developers need a provider that not only keeps keys safe but also allows them to scale with confidence, knowing that every transaction is authorized and protected.






