Yandex Cloud
Search
Contact UsGet started
  • Blog
  • Pricing
  • Documentation
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • ML & AI
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Customer Stories
    • Gateway to Russia
    • Cloud for Startups
    • Education and Science
  • Blog
  • Pricing
  • Documentation
Yandex project
© 2025 Yandex.Cloud LLC
Security in Yandex Cloud
  • Key security principles
  • Division of responsibility
  • Compliance
  • Security measures on the Yandex Cloud side
  • Security tools available to cloud service users
    • All recommendations
    • IaaS security checklist
    • Authentication and authorization security checklist
    • Kubernetes security
    • Reference architecture for cloud infrastructure in isolated mode without internet access
  • User support policy during vulnerability scanning
  • Security bulletins
  • Public IP address ranges

In this article:

  • Checklists
  • General recommendations
  1. Recommendations for securing your cloud infrastructure
  2. All recommendations

All recommendations

Written by
Yandex Cloud
Updated at November 14, 2024
  • Checklists
  • General recommendations

ChecklistsChecklists

  • IaaS security checklist
  • Authentication and authorization security checklist
  • Security Kubernetes

General recommendationsGeneral recommendations

  • Reference architecture for cloud infrastructure in isolated mode without internet access

Was the article helpful?

Previous
Security tools available to cloud service users
Next
IaaS security checklist
Yandex project
© 2025 Yandex.Cloud LLC