Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Security Deck
    • All guides
      • Overview
      • View control and violation rules
      • Performing security compliance checks
      • Managing exceptions to control rules
  • Pricing policy
  • Audit Trails events
  • Release notes
  1. Step-by-step guides
  2. Cloud Security Posture Management (CSPM)
  3. Performing security compliance checks

Checking your infrastructure for compliance with security standards

Written by
Yandex Cloud
Updated at February 5, 2026

The compliance UI allows you to view the sets of requirements currently active in an environment, browse through control rule lists included in the requirement sets, and manage exceptions.

To check your infrastructure for compliance with security standards (requirement sets) which currently apply in the environment:

Security Deck UI
  1. Go to Yandex Security Deck.

  2. In the left-hand panel, select Compliance.

    In the window that opens, you will see a list with info on security requirement sets used to verify the infrastructure's compliance in the selected environment. The list contains the following information:

    • Rule set: Name of the industry security standard or regulation that matches the requirement set.

    • Rules in set: Number of control rules in the requirement set.

    • Rule execution: Percentage of rules that are followed from the total rules in the requirement set. The 100% value means full compliance with the relevant security standard or regulation.

      If you disabled compliance checks of the environment resources against the requirement set, this field will contain Not verified.

      Tip

      In the compliance UI, you can turn compliance checks for particular requirements on or off for your current workspace. First, make sure you are in the right workspace. Click next to the set of requirements and select Enable verification or Disable verification.

  3. To view a list of control rules included in a set of requirements, click the relevant line. In the window that opens:

    • On the dashboard at the top, there is a summary of the results, which highlights the most common violations, and a diagram for severity of identified violations of a safety standard or regulation.

    • Below the dashboard is a table listing the control rules included into the selected set of requirements. For each rule, the table displays the following information:

      • : Rule criticality level; this icon indicates how security-critical the rule is:

        • : Remark
        • : Low severity.
        • : Medium severity.
        • : High severity.
      • Control rule: Control rule name.
      • Module of control: Security Deck module to check your infrastructure for compliance with that rule: Configuration Monitoring (CSPM) or Kubernetes Security Posture Management® (KSPM).
      • Violations: Number of rule violations detected in the selected workspace.

      To learn more about a security control rule, click the table row with its name. You will see a window with rule details, which has the following tabs:

      Overview
      Violations
      Exceptions
      Recommendations

      The Overview tab contains:

      • Rule ID.

      • Set of security requirements the rule applies to.

      • Date and time of the most recent security check.

      • Check method:

        • automatic: Rule is checked automatically once every eight hours.
        • manual: Rule has to be checked manually.
      • Details on the monitored features, their configurations, or actions performed with them.

      The Violations tab lists control rule violations detected during the checks. Detected violations will not appear in this list if they satisfy the exception criteria specified for the rule.

      The Exceptions tab lists all exceptions defined for the rule along with controls for exception management.

      The Recommendations tab provides guides and solutions to assist you with rule compliance.

    Tip

    To configure exceptions to apply when checking your controlled infrastructure for compliance with the rule, refer to Managing exceptions to the CSPM module's security control rules.

See alsoSee also

  • Compliance UI

Was the article helpful?

Previous
View control and violation rules
Next
Managing exceptions to control rules
© 2026 Direct Cursus Technology L.L.C.