Yandex Cloud
Search
Contact UsGet started
  • Blog
  • Pricing
  • Documentation
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • ML & AI
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Customer Stories
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Education and Science
    • Yandex Cloud Partner program
  • Blog
  • Pricing
  • Documentation
© 2025 Direct Cursus Technology L.L.C.
Yandex Security Deck
    • Overview
    • Access Transparency
    • Data Security Posture Management (DSPM)
    • Cloud Infrastructure Entitlement Management (CIEM)
    • Quotas and limits
  • Pricing policy
  1. Concepts
  2. Access Transparency

Access Transparency

Written by
Yandex Cloud
Updated at March 31, 2025

Access Transparency is an automated tool providing insights into the actions Yandex Cloud engineers take with your organization's resources during maintenance, when handling support requests, or for security purposes. With this tool, you can gain visibility and control over the actions of Yandex Cloud engineers.

To connect and use Access Transparency, your organization must be linked to a billing account. Follow this guide to link your organization to a billing account.

Once your organization links a billing account, select it in the Access Transparency module. This can only be done by a user with the billing.accounts.owner role.

Key Access Transparency features:

  • Collects and analyzes data on the actions taken by Yandex Cloud engineers with the organization's resources.

  • Provides access to security verdicts of specific user sessions.

  • Automatically alerts you to suspicious activity or security breaches:

    • A specialized model based on YandexGPT analyzes the logs of Yandex Cloud personnel activity with your organization's resources.
    • If the model detects security risks in a Yandex Cloud employee’s actions, a request is automatically created to verify these actions.
    • If you do not agree with the analysis or assessment, you can escalate the request to have the session reviewed by Yandex Cloud information security team.

Was the article helpful?

Previous
Overview
Next
Data Security Posture Management (DSPM)
© 2025 Direct Cursus Technology L.L.C.