Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Identity and Access Management
    • Overview
      • Overview
      • Access policies
      • Roles
      • System groups
      • Public groups
      • Resources that roles can be assigned for
      • Impersonation
    • Service access to user resources
    • Identity federations
    • Workload identity federations
    • Quotas and limits
  • Secure use of Yandex Cloud
  • Access management
  • Pricing policy
  • Role reference
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Release notes

In this article:

  • Relationships between access policies and roles
  • Resources governed by access policies
  • Supported access policies
  1. Concepts
  2. How access management works
  3. Access policies

Access policies

Written by
Yandex Cloud
Updated at February 25, 2026
  • Relationships between access policies and roles
  • Resources governed by access policies
  • Supported access policies

Note

This feature is in the Preview stage. To get access, contact tech support or your account manager.

Access policies are a Yandex Identity and Access Management mechanism that allows you to manage permissions for performing specific operations on Yandex Cloud resources. Access policies complement the role system for more flexible access management.

Relationships between access policies and rolesRelationships between access policies and roles

Access policies enforce explicit restrictions, unlike roles, which grant explicit permissions. The relationships between access policies and roles are as follows:

  • Access policies take priority over roles. If an access policy prohibits an action, it will be denied even if the user’s role allows the operation.

    Access permissions are checked in the following order:

    1. The system checks access policies for an explicit restriction to perform the operation. If there is such a restriction, the operation is denied without any further checks.
    2. In case there is no restriction, the system checks if the user is assigned a role required to perform the operation and allows or denies the operation accordingly.
  • Access policies do not replace roles, but add an extra layer of access control. To perform operations, users still require the relevant roles, regardless of the exisiting access policies.

  • To manage access policies, a user must have one of the following roles:

    • resource-manager.admin or admin for the folder or cloud to manage access policies at the folder or cloud level, respectively.
    • organization-manager.admin or admin for the organization to manage access policies at the organization level.

Resources governed by access policiesResources governed by access policies

Access policies assigned at higher levels of the Yandex Cloud resource hierarchy are inherited by lower-level resources.

You can assign access policies for the following resources:

  • Organization: Access policy applies to resources in all clouds and folders within an organization.
  • Cloud: Access policy applies to resources in all folders within a cloud.
  • Folder: Access policy applies only to resources within a specific folder.

You can assign multiple policies for a single resource.

Supported access policiesSupported access policies

Currently, Identity and Access Management supports the following access policies:

Policy ID

Imposed restrictions

iam.denyServiceAccountCreation

Prohibits creating service accounts.

iam.denyServiceAccountAccessKeysCreation

Prohibits creating static access keys for service accounts.

iam.denyServiceAccountApiKeysCreation

Prohibits creating API keys for service accounts.

iam.denyServiceAccountAuthorizedKeysCreation

Prohibits creating authorized keys for service accounts.

iam.denyServiceAccountFederatedCredentialsCreation

Prohibits associating service accounts with workload identity federations.

iam.denyServiceAccountCredentialsCreation

  • Prohibits creating any credentials for service accounts (except IAM tokens).
  • Prohibits associating service accounts with workload identity federations.

iam.denyServiceAccountImpersonation

Prohibits impersonation.

organization.denyMemberInvitation

Prohibits inviting new Yandex account users to the organization. This policy must be assigned to an organization.

organization.denyUserListing

Prohibits viewing the list of organization users. This policy must be assigned to an organization.

See alsoSee also

  • Getting a list of supported access policies
  • Assigning an access policy
  • Viewing assigned access policies
  • Revoking an access policy

Was the article helpful?

Previous
Overview
Next
Roles
© 2026 Direct Cursus Technology L.L.C.