Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Security Deck
    • Overview
    • Security Deck workspaces
    • Alerts in Security Deck
      • Overview
      • Yandex Cloud basic security rules
      • Cloud infrastructure security standard Yandex Cloud
      • CIS Benchmark™ requirements for Kubernetes
      • Personal data protection standard for Yandex Cloud users
      • PCI DSS standard in Yandex Cloud
    • Data Security Posture Management (DSPM)
    • Kubernetes® Security Posture Management (KSPM)
    • Cloud Infrastructure Entitlement Management (CIEM)
    • Cloud Security Posture Management (CSPM)
    • Threat Detector (TD)
    • Vulnerability Management (VM)
    • Access Transparency
    • AI assistant
    • Quotas and limits
  • Pricing policy
  • Audit Trails events
  • Release notes
  1. Concepts
  2. Compliance UI
  3. PCI DSS standard in Yandex Cloud

PCI DSS in Yandex Cloud

Written by
Yandex Cloud
Updated at May 5, 2026

Note

This feature is at the Preview stage.

These rules help you automate compliance with data security standards designed to protect payment card data.

The standard was established by the Payment Card Industry Security Standards Council (PCI SSC) founded by major international payment systems including Visa, MasterCard, American Express, Discover, and JCB.

To ensure PCI DSS compliance, use the following rules:

Requirement ID

Security standard requirement

Check IDs in the CSPM module

1. Installing and maintaining network security controls

1.2

Configuration and maintenance of network security controls (NSCs)

cspm.network.firewall
cspm.access.acl-container-registry
cspm.k8s.network-firewall-scope

1.3

Restricted network access to and from the cardholder data environment (CDE)

cspm.network.db-security-group
cspm.network.ydb-public
cspm.trusted-ip
cspm.trusted-ip-k8s

1.4

Control of network connections between trusted and untrusted networks

cspm.network.firewall
cspm.network.db-security-group

2. Applying secure configurations to all system components

2.2

Secure configuration and management of system components

cspm.data.storage-https
cspm.appsec.cdn-https
cspm.k8s.kubernetes-safe-config

3. Protecting stored account data

3.2, 3.3, 3.4

Minimized storage time, prohibition to store SAD, masked PAN display

cspm.db.db-deletion-protection

3.5

Ensuring that stored PANs are unreadable

cspm.data.object-storage-encryption
cspm.crypto.managed-vm-kms
cspm.crypto.data.application-encryption

3.6, 3.7

Protection and management of cryptographic keys

cspm.crypto.sa-key-rotation
cspm.crypto.keys-hsm
cspm.crypto.keys-rotation
cspm.crypto.keys-deletion-protection
cspm.crypto.secrets-lockbox
cspm.crypto.secrets-serverless
cspm.crypto.secrets-coi

4. Protecting transmission of cardholder data over public networks with strong cryptography

4.2

Protection of PANs with strong cryptography during transmission

cspm.data.storage-https
cspm.appsec.alb-https
cspm.appsec.api-gateway-https

5. Protecting all systems and networks against malware

5.2, 5.3

Prevention, detection, and removal of malware; ensuring the mechanisms are actively running

cspm.appsec.upload-policy

5.4

Protecting users against phishing attacks

cspm.appsec.use-smartcaptcha

6. Developing and maintaining secure systems and software

6.3

Detecting and addressing security vulnerabilities

cspm.active.ip-vulnerability-scan
cspm.appsec.upload-policy
cspm.appsec.secure-registry
cspm.appsec.periodic-scan
cspm.k8s.version-update

6.4

Protecting public-facing web applications against attacks

cspm.appsec.use-sws
cspm.appsec.use-waf
cspm.appsec.use-arl
cspm.appsec.ddos-protection.l7
cspm.appsec.ddos-protection.l3

7. Restricting access to system components and cardholder data based on need to know

7.2

Proper identification of system components and data and provision of access to them

cspm.access.min-privileges
cspm.access.defined-key-scopes
cspm.access.db-datalens-access
cspm.access.db-console-access
cspm.access.sa-privileges-org-roles
cspm.access.sa-privileges-service-roles

7.3

Managing access to system components and data via one or more access management systems

cspm.access.public-access

8. User identification and authentication for access to system components

8.3

Reliable authentication for users and administrators

cspm.access.serial-console
cspm.crypto.sa-key-rotation

8.6

Managing the use of application or system accounts

cspm.crypto.sa-key-rotation
cspm.access.defined-key-scopes

10. Recording and monitoring all access events to system components and cardholder data

10.2

Generating security event logs with required details

cspm.o11y.audit-trails
cspm.o11y.audit-trails-no-errors
cspm.o11y.data-plane-events
cspm.k8s.audit-logs

11. Regular testing of system and network security

11.3

Regular detection, prioritization, and elimination of external and internal vulnerabilities

cspm.active.ip-vulnerability-scan
cspm.appsec.upload-policy

12. Maintaining information security with organizational policies and programs

12.10

Incident response

cspm.backup.compute-disks
cspm.k8s.backup

Was the article helpful?

Previous
Personal data protection standard for Yandex Cloud users
Next
Data Security Posture Management (DSPM)
© 2026 Direct Cursus Technology L.L.C.