Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Yandex Security Deck
    • Overview
    • Security Deck workspaces
    • Alerts in Security Deck
    • Yandex Cloud Detection and Response (YCDR)
    • Data Security Posture Management (DSPM)
    • Kubernetes® Security Posture Management (KSPM)
    • Cloud Infrastructure Entitlement Management (CIEM)
    • Cloud Security Posture Management (CSPM)
    • Access Transparency
    • AI assistant
    • Quotas and limits
  • Pricing policy
  1. Concepts
  2. Kubernetes® Security Posture Management (KSPM)

Kubernetes® Security Posture Management (KSPM)

Written by
Yandex Cloud
Updated at November 25, 2025

Note

Kubernetes® Security Posture Management (KSPM) is at the Preview stage and provided upon request. Also, it requires access to Security Deck workspaces.

To get access, contact support or your account manager.

If you want to use an AI assistant to work with alerts, request access to it as well.

Kubernetes Security Posture Management (KSPM) ensures the security of containerized applications and images they use.

The KSPM module automatically identifies all Kubernetes clusters and containers in the specified workspace, and deploys security components in them as defined in the configuration. New clusters automatically get security coverage, without requiring manual search or installation of any components.

The module continuously assesses workloads for misconfigurations and provides runtime security monitoring through sensors that detect attacks targeting nodes and containers.

The KSPM configuration is set when you create a workspace and may include checking clusters for compliance with the following standards:

  • Kubernetes Pod Security Standards (Restricted): This standard contains security controls based on the Kubernetes Pod Security Standards (PSS) Restricted profile. A restricted profile is the most secure and provides the highest detection efficiency for container-based attacks. It applies strict security policies that may require modifying applications to ensure compliance. A restricted profile is recommended for security-critical applications and environments where maximum security is required.
  • Kubernetes Pod Security Standards (Baseline): This standard contains security controls based on the Kubernetes Pod Security Standards (PSS) Baseline profile. A baseline profile is designed for easy implementation and provides common best practices for container security. It prevents the most common security issues in containers while maintaining compatibility with most applications. The baseline profile is a good starting point for organizations just getting started with container security.
  • Microsoft Threat Matrix for Kubernetes: This standard contains security controls based on the Microsoft Threat Matrix for Kubernetes, which is a framework that helps security teams understand and fend off threats specific to Kubernetes environments. It provides a comprehensive approach to attack methods and defensive strategies tailored for container orchestration platforms.

The KSPM module allows you to flexibly select and customize security rules to meet your organization's specific requirements, as well as create rule exceptions.

For each security rule violation, an alert is created with a detailed description of the violation, severity, detection time, list of affected resources and troubleshooting recommendations.

You can manage troubleshooting for each specific alert:

  • Assign persons responsible for troubleshooting.
  • Manage the alert status.
  • Leave comments.
  • Keep track of troubleshooting progress.
  • Request analysis from the AI assistant.

For more information, see Activating KSPM.

See alsoSee also

  • Security Deck workspaces
  • Cloud Security Posture Management (CSPM)
  • Security Deck AI assistant
  • Getting started with Yandex Security Deck
  • Activating KSPM.
  • Kubernetes® Security Posture Management (KSPM) service roles

Was the article helpful?

Previous
Data Security Posture Management (DSPM)
Next
Cloud Infrastructure Entitlement Management (CIEM)
© 2025 Direct Cursus Technology L.L.C.