Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Security Deck
    • Overview
    • Security Deck workspaces
    • Alerts in Security Deck
      • Overview
      • Yandex Cloud basic security rules
      • Cloud infrastructure security standard Yandex Cloud
      • CIS Benchmark™ requirements for Kubernetes
      • Personal data protection standard for Yandex Cloud users
      • PCI DSS standard in Yandex Cloud
    • Data Security Posture Management (DSPM)
    • Kubernetes® Security Posture Management (KSPM)
    • Cloud Infrastructure Entitlement Management (CIEM)
    • Cloud Security Posture Management (CSPM)
    • Threat Detector (TD)
    • Vulnerability Management (VM)
    • Access Transparency
    • AI assistant
    • Quotas and limits
  • Pricing policy
  • Audit Trails events
  • Release notes
  1. Concepts
  2. Compliance UI
  3. Personal data protection standard for Yandex Cloud users

Personal data protection standard for Yandex Cloud users

Written by
Yandex Cloud
Updated at May 5, 2026

Note

This feature is at the Preview stage.

This collection of rules automates legal compliance monitoring in Yandex Cloud resources as per Russian Federal Law No. 152-FZ of July 27, 2006.

These rules ensure protection of personal data in accordance with FSTEC Requirements (Order 21):

Requirement ID

Security standard requirement

Check IDs in the CSPM module

Identification and authentication of access subjects and access objects (IA)

IA.1

Identification and authentication of users who are the operator's employees

cspm.access.check-bindings

IA.4

Management of authentication means including the storage, issue, initialization and blocking of authentication means and taking relevant measures in case of loss and/or compromising a means of authentication

cspm.crypto.secrets-lockbox
cspm.crypto.secrets-serverless
cspm.crypto.secrets-coi
cspm.crypto.sa-key-rotation
cspm.aws-token

Management of access by access subjects to access objects (MA)

MA.2

Implementation of necessary access control methods (discretionary, mandate, role-based or other method), types (reading, recording, execution or other type) and rules

cspm.access.min-privileges
cspm.access.sa-privileges
cspm.access.defined-key-scopes
cspm.access.db-datalens-access
cspm.access.db-console-access

MA.3

Management of information flows between devices (filtration, routing, connection control, one-way transmission and other management methods), segments of the information system and information systems

cspm.network.firewall
cspm.network.db-security-group
cspm.network.db-ip
cspm.network.ydb-public
cspm.network.serverless-uses-vpc
cspm.trusted-ip
cspm.trusted-ip-k8s
cspm.k8s.network-firewall-scope

MA.4

Separation of powers (roles) of users, administrators and persons in charge of the information system's operation

cspm.access.min-privileges
cspm.access.sa-privileges
cspm.access.sa-privileges-org-roles
cspm.access.sa-privileges-service-roles

MA.5

Granting minimal necessary rights and privileges to users, administrators and persons in charge of the information system's operation

cspm.access.min-privileges
cspm.access.sa-privileges
cspm.access.sa-privileges-org-roles
cspm.access.sa-privileges-service-roles
cspm.access.kms-keys-access

MA.6

Limiting unsuccessful attempts to log in to the information system (access to the information system)

cspm.appsec.use-arl

MA.10

Blocking access session to the information system upon the expiry of a determined user's idle time (inactivity) or at the user's request

cspm.cookie-timeout.organization

MA.11

Authorization (ban) of user's acts permitted before identification and authentication

cspm.access.public-access

MA.13

Implementation of protected remote access by access subjects to access objects through external information telecommunication network

cspm.access.serial-console

MA.17

Providing trusted loading of computer equipment

cspm.crypto.managed-vm-kms

Software environment restrictions (SER)

SER.1

Managing execution of software components, including defining components to be executed, configuring the execution parameters of components, and monitoring execution of software components

cspm.k8s.kubernetes-safe-config
cspm.k8s.kspm

SER.2

Managing installation of software components, including defining components to be installed, configuring the installation parameters of components, and monitoring installation of software components

cspm.appsec.secure-registry
cspm.appsec.upload-policy

SER.3

Restrictions for only authorized software and/or installation of its components

cspm.appsec.periodic-scan
cspm.access.acl-container-registry

Security event logging (SEL)

SEL.1

Determining security events to be logged and their storage time

cspm.o11y.audit-trails
cspm.o11y.audit-trails-no-errors

SEL.2

Determining scope and contents of information about security events to be logged

cspm.o11y.data-plane-events
cspm.k8s.audit-logs

SEL.3

Collecting, recording and storing information on security events during the determined storage time

cspm.o11y.audit-trails
cspm.o11y.audit-trails-no-errors
cspm.k8s.audit-logs

SEL.4

Responding to failures when recording security events, including hardware and software errors, failures in information collection mechanisms, and reaching the limit or overflow of memory capacity

cspm.o11y.audit-trails

SEL.7

Protection of information on security events

cspm.s3.used-object-lock
cspm.data.object-storage-encryption

Virus protection (VP)

VP.1

Implementation of virus protection

cspm.appsec.upload-policy
cspm.appsec.periodic-scan

VP.2

Updating the database of malware (virus) signatures

cspm.appsec.periodic-scan

Intrusion detection system (IDS)

IDS.1

Intrusion detection

cspm.appsec.use-waf
cspm.appsec.use-sws

IDS.2

Decision rule base update

cspm.appsec.periodic-scan

Control (analysis) of personal data security (AS)

AS.1

Detection and analysis of the information system's vulnerabilities and prompt elimination of newly detected vulnerabilities

cspm.active.ip-vulnerability-scan
cspm.appsec.upload-policy
cspm.appsec.periodic-scan

AS.2

Control of installation of software updates, including software updates for information protection means

cspm.k8s.version-update

AS.3

Control of operability, settings and faultless operation of software and information protection means

cspm.k8s.kubernetes-safe-config
cspm.appsec.secure-registry

AS.4

Control of composition of hardware, software, and information protection means

cspm.o11y.labeled-resources

AS.5

Password policy

cspm.access.min-privileges

Integrity of the information system and information (INT)

INT.1

Software integrity control, including information protection software

cspm.runtime.vm-environment-integrity

INT.2

Control of integrity of information stored in the information system databases

cspm.crypto.data.application-encryption
cspm.data.object-storage-encryption
cspm.crypto.managed-vm-kms
cspm.crypto.keys-hsm
cspm.crypto.keys-rotation

INT.3

Ensuring recoverability of software, including information protection software, in emergencies

cspm.compute.snapshot
cspm.k8s.backup
cspm.backup.compute-disks

INT.4

Detection and response to the receipt of unsolicited electronic messages (letters, documents) and other information that is not related to the functioning of the information system (spam protection)

cspm.appsec.use-smartcaptcha
cspm.appsec.use-waf
cspm.appsec.use-arl

INT.6

Restricting user permissions to enter information into the information system

cspm.access.min-privileges
cspm.access.sa-privileges

Availability of personal data (AVL)

AVL.4

Periodic information backup on machine media reserved for information backups

cspm.compute.snapshot
cspm.k8s.backup

AVL.5

Ensuring the possibility of restoring information from machine media reserved for information backups (backup copies) within a specified time interval

cspm.compute.snapshot
cspm.k8s.backup

Protection of hardware (PH) / Virtualization environment protection (VEP)

VEP.1

Identification and authentication of access subjects and access objects in the virtual infrastructure, including administrators of virtualization means

cspm.k8s.kubernetes-safe-config
cspm.k8s.access

VEP.2

Managing access of access subjects to access objects in the virtual infrastructure, including access within virtual machines

cspm.k8s.kubernetes-safe-config
cspm.k8s.access

VEP.3

Logging security events in the virtual infrastructure

cspm.k8s.audit-logs

VEP.4

Managing (filtering, routing, connection control, unidirectional transmission) information flows between virtual infrastructure components, as well as around the virtual infrastructure perimeter

cspm.network.firewall

VEP.5

Trusted boot of virtualization servers, virtual machine (container), virtualization management servers

cspm.runtime.vm-environment-integrity

VEP.6

Managing the migration of virtual machines (containers) and the data processed on them

cspm.k8s.kubernetes-safe-config

VEP.7

Control of integrity of the virtual infrastructure and its configurations

cspm.k8s.kubernetes-safe-config

VEP.8

Data backup, redundancy of virtual infrastructure hardware and software, as well as communication channels within the virtual infrastructure

cspm.k8s.backup

VEP.9

Anti-virus protection in the virtual infrastructure

cspm.appsec.upload-policy
cspm.appsec.periodic-scan
cspm.appsec.registry-recently-scan

VEP.10

Segmentation of the virtual infrastructure for processing of information by an individual user and/or group of users

cspm.k8s.kubernetes-safe-config
cspm.appsec.periodic-scan

Protection of the information system, its equipment, communication and data transmission systems (PIS)

PIS.1

Segregation of duties for the management (administration) of the information system, management (administration) of the information protection system, information processing functions and other information system functions

cspm.access.min-privileges

PIS.3

Protection of information against disclosure, modification and forcing (input of false information) during transferring (preparation for transferring) thereof through communication channels which go beyond the controlled zone

cspm.crypto.certificate-validity
cspm.data.storage-https
cspm.appsec.alb-https
cspm.appsec.api-gateway-https
cspm.appsec.cdn-https

PIS.4

Trusted channel, route between the administrator, user, and means of information protection (security features of means of information protection)

cspm.access.serial-console

PIS.11

Authenticity of network connections (interaction sessions), including protection against spoofing of network devices and services

cspm.data.storage-https
cspm.appsec.alb-https
cspm.appsec.api-gateway-https
cspm.appsec.cdn-https

PIS.15

Archived files protection, protection of information security tools settings and software, and other data that cannot be changed during the processing of information

cspm.db.db-deletion-protection

PIS.17

Dividing the information system into segments (segmentation of the information system) and ensuring the protection of the perimeters of the information system segments

cspm.trusted-ip-k8s
cspm.k8s.api-security

Identifying and responding to incidents (IM)

IM.2

Incident detection, identification and registration

cspm.o11y.audit-trails
cspm.k8s.audit-logs
cspm.procedure.organization-contacts

IM.6

Planning and taking measures to prevent the recurrence of incidents

cspm.k8s.version-update
cspm.appsec.periodic-scan

Management of configuration of the information system and the personal data protection (MC)

MC.1–MC.4

Management of configuration of the information system and the personal data protection

cspm.k8s.kubernetes-safe-config

Was the article helpful?

Previous
CIS Benchmark™ requirements for Kubernetes
Next
PCI DSS standard in Yandex Cloud
© 2026 Direct Cursus Technology L.L.C.