Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Security Deck
    • Overview
    • Security Deck workspaces
    • Alerts in Security Deck
    • Data Security Posture Management (DSPM)
    • Kubernetes® Security Posture Management (KSPM)
    • Cloud Infrastructure Entitlement Management (CIEM)
    • Cloud Security Posture Management (CSPM)
    • Vulnerability Management (VM)
    • Access Transparency
    • AI assistant
    • Quotas and limits
  • Pricing policy
  • Audit Trails events
  • Release notes

In this article:

  • Image scanning
  • Scan triggers
  • Scanning images in Kubernetes clusters
  1. Concepts
  2. Vulnerability Management (VM)

About Vulnerability Management (VM)

Written by
Yandex Cloud
Updated at March 26, 2026
  • Image scanning
    • Scan triggers
    • Scanning images in Kubernetes clusters

Note

This feature is in the Preview stage. To get access, contact tech support or your account manager.

Vulnerability Management is a tool for centralized management of container image vulnerability scanning and for viewing scan results within your workspace.

It detects vulnerabilities in container images stored in Container Registry and Cloud Registry and in images run in Managed Service for Kubernetes clusters.

Image scanningImage scanning

Vulnerability Management supports scanning container images from the following sources:

  • Yandex Container Registry, the Docker image storage and distribution service.
  • Yandex Cloud Registry, the artifact storage and distribution service for artifacts of different types, including container images.
  • Kubernetes clusters monitored by Kubernetes® Security Posture Management (KSPM).

Scan triggersScan triggers

Image scanning can start automatically on one of the following triggers:

  • Image push: Scanning starts automatically when you push a new image to Container Registry or Cloud Registry.
  • Scheduled run: Scanning starts from time to time according to a schedule. The scan covers all images in the registries, including those added after the previous scan.
  • Image use: Scanning starts automatically when you create a new Managed Service for Kubernetes cluster or container with an image in an existing cluster.

You can combine the triggers for maximum scan coverage.

Scanning images in Kubernetes clustersScanning images in Kubernetes clusters

When integrated with KSPM, Vulnerability Management automatically detects images running in Managed Service for Kubernetes clusters assigned to the workspace.

With the scheduled scan trigger on, the scanning of Kubernetes cluster images works like a filter: each run generates a list of images which are then scanned.

See alsoSee also

  • Security Deck workspaces
  • Kubernetes® Security Posture Management (KSPM)
  • About Alerts

Was the article helpful?

Previous
Cloud Security Posture Management (CSPM)
Next
Access Transparency
© 2026 Direct Cursus Technology L.L.C.