Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Yandex Security Deck
    • All guides
  • Pricing policy

In this article:

  • Security Deck workspaces
  • Data Security Posture Management (DSPM)
  • Kubernetes® Security Posture Management (KSPM)
  • Cloud Security Posture Management (CSPM)
  • Cloud Infrastructure Entitlement Management (CIEM)
  1. Step-by-step guides
  2. All guides

How to work with Yandex Security Deck

Written by
Yandex Cloud
Updated at November 25, 2025
  • Security Deck workspaces
  • Data Security Posture Management (DSPM)
  • Kubernetes® Security Posture Management (KSPM)
  • Cloud Security Posture Management (CSPM)
  • Cloud Infrastructure Entitlement Management (CIEM)

Security Deck workspacesSecurity Deck workspaces

  • Creating a Security Deck workspace.
  • Viewing the workspace dashboard and operations in Security Deck.
  • Updating a Security Deck workspace and its components.
  • Configuring the Security Deck workspace access permissions.
  • Deleting a Security Deck workspace.

Data Security Posture Management (DSPM)Data Security Posture Management (DSPM)

  • Creating a DSPM data source.
  • Creating a DSPM scan.

Kubernetes® Security Posture Management (KSPM)Kubernetes® Security Posture Management (KSPM)

  • Activating KSPM.
  • Working with the KSPM dashboard.
  • Viewing Kubernetes control rules.
  • Managing exceptions to the KSPM module's security control rules.

Cloud Security Posture Management (CSPM)Cloud Security Posture Management (CSPM)

  • Viewing CSPM security control rules and related violations.
  • Managing exceptions to the CSPM module's security control rules

Cloud Infrastructure Entitlement Management (CIEM)Cloud Infrastructure Entitlement Management (CIEM)

  • Viewing a list of a subject's accesses.
  • Revoking subject's access.

Was the article helpful?

Previous
Overview
Next
Overview
© 2025 Direct Cursus Technology L.L.C.