Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Yandex Security Deck
    • Overview
    • Security Deck workspaces
    • Alerts in Security Deck
    • Yandex Cloud Detection and Response (YCDR)
    • Data Security Posture Management (DSPM)
    • Kubernetes® Security Posture Management (KSPM)
    • Cloud Infrastructure Entitlement Management (CIEM)
    • Cloud Security Posture Management (CSPM)
    • Access Transparency
    • AI assistant
    • Quotas and limits
  • Pricing policy

In this article:

  • Viewing access permissions
  • Revoking access permissions
  1. Concepts
  2. Cloud Infrastructure Entitlement Management (CIEM)

Cloud Infrastructure Entitlement Management (CIEM)

Written by
Yandex Cloud
Updated at October 13, 2025
  • Viewing access permissions
  • Revoking access permissions

Note

This feature is in the Preview stage. To get access, contact tech support or your account manager.

To ensure data and cloud infrastructure security, you need to regularly audit the access permissions of users and service accounts.

Cloud Infrastructure Entitlement Management or CIEM is a tool providing a centralized view of the full list of accesses to the organization's resources available to the subjects, i.e., users, service accounts, user groups, system groups, and public groups. The tool also makes it easy to revoke excessive access permissions from subjects.

Viewing access permissionsViewing access permissions

Only organization members with the organization-manager.viewer role or higher for the organization can view access permissions in the Security Deck interface.

For each access permission, the list indicates the name/ID and type of resource to which access was granted, the role assigned to the subject for that resource, and information about whether the role was assigned to the subject directly or was inherited from a group of which the subject is a member.

Cloud Infrastructure Entitlement Management allows you to view the access permissions assigned to an individual subject (user or service account):

  • Directly
  • Via a user group
  • Via a system group
  • Via a public group

To check whether access to a particular resource was assigned to a subject directly or via a group, refer to the Group field of the table listing the subject’s access permissions. If the role was assigned directly, this field will be empty. In other cases, it will show the name of the group and its ID.

Access permissions are always assigned to groups directly, so for groups, the Group field of the table with aceess permissions is always empty.

You can filter the list of access permissions granted to a subject by:

  • ID of the resource the access was granted to.
  • ID of the granted role.
  • Assignment method, Directly appointed or Assigned via group.

Warning

Currently, Cloud Infrastructure Entitlement Management does not display subjects’ access permissions for Yandex DataLens resources and billing accounts.

Revoking access permissionsRevoking access permissions

Cloud Infrastructure Entitlement Management allows you to revoke excessive access permissions from a subject or group and remove a subject from a user group as needed.

To revoke access permissions, users must have one of these roles: admin, resource-manager.admin, organization-manager.admin, resource-manager.clouds.owner, organization-manager.organizations.owner, or the administrator role in the service where they want to revoke the subject's access to a resource.

You can only remove a subject from a group created by an organization administrator. You cannot remove a subject from a system or public group.

See alsoSee also

  • Viewing a list of a subject's accesses
  • Revoking subject's access

Was the article helpful?

Previous
Kubernetes® Security Posture Management (KSPM)
Next
Cloud Security Posture Management (CSPM)
© 2025 Direct Cursus Technology L.L.C.