Yandex Cloud
Search
Contact UsGet started
  • Blog
  • Pricing
  • Documentation
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • ML & AI
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Customer Stories
    • Gateway to Russia
    • Cloud for Startups
    • Education and Science
  • Blog
  • Pricing
  • Documentation
Yandex project
© 2025 Yandex.Cloud LLC
Yandex Audit Trails
  • Getting started
    • All tutorials
    • Searching for Yandex Cloud events in Object Storage
    • Searching for Yandex Cloud events in Cloud Logging
    • Alert settings in Monitoring
    • Configuring a response in Cloud Functions
    • Processing Audit Trails events
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Management event reference
  • Data event reference
  • Release notes

In this article:

  • Scheme of operation
  • Example implementation
  • What's next
  1. Tutorials
  2. Configuring a response in Cloud Functions

Configuring responses in Yandex Cloud Logging and Yandex Cloud Functions

Written by
Yandex Cloud
Updated at April 28, 2025
  • Scheme of operation
  • Example implementation
  • What's next

You can configure Cloud Functions to automatically respond to audit log events. For example, to send messages through convenient notification channels or automatically modify Yandex Cloud resource settings to compensate for changes.

Scheme of operationScheme of operation

In general, you will require the following components to configure responses via Cloud Functions:

  1. A trail uploads audit logs to a log group.
  2. A log group acts as an interface between a trail and a Cloud Functions trigger.
  3. A Yandex Cloud Logging trigger calls the function when adding an entry to a log group.
  4. A Cloud Functions function to execute the response logic.
  5. An optional auxiliary component, such as a Telegram bot or mail server.

Example implementationExample implementation

Yc-security-solutions-library contains an example solution that uses Cloud Functions to provide notification of specified events via a Telegram bot and perform compensating actions on Yandex Cloud resources via API methods.

Notifications are implemented for the following events:

  • Security groups: Allowing incoming traffic to all private addresses (0.0.0.0/0).
  • Object Storage: Enabling public access to buckets.
  • Yandex Lockbox: Assigning access to a secret.

Compensating actions on Yandex Cloud resources:

  • Security groups: Delete the rule.
  • Yandex Lockbox: Disable assigned access to the secret.

Note

Yandex Cloud Security Solution Library is a public repo on GitHub with a set of examples and recommendations on how to build a secure infrastructure in Yandex Cloud.

A solution contains the source codes of a Python function and a Terraform script that configures all the Yandex Cloud components required to complete the procedure.

What's nextWhat's next

  • Learn more about the audit log format.
  • Learn about existing solutions to export audit logs to SIEM.

Was the article helpful?

Previous
Alert settings in Monitoring
Next
Processing Audit Trails events
Yandex project
© 2025 Yandex.Cloud LLC