Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Yandex Security Deck
    • All guides
      • Overview
      • Activating KSPM
      • Working with a dashboard
      • Viewing control rules
      • Managing exceptions to control rules
  • Pricing policy
  1. Step-by-step guides
  2. Kubernetes® Security Posture Management (KSPM)
  3. Working with a dashboard

Working with the KSPM dashboard

Written by
Yandex Cloud
Updated at November 25, 2025

Note

Kubernetes® Security Posture Management (KSPM) is at the Preview stage and provided upon request. Also, it requires access to Security Deck workspaces.

To get access, contact support or your account manager.

If you want to use an AI assistant to work with alerts, request access to it as well.

Security Deck UI
  1. Go to Yandex Security Deck.
  2. In the left-hand panel, select KSPM.
  3. At the top of the window, click More and select the workspace.
  4. On the Clusters tab, make sure all the clusters are connected to KSPM and are in the active control status.
  5. Review the Dashboard tab. It has the following sections:
    • Top controls with warnings: Contains the most frequently violated rules within the control scope and gives the number of violations.

    • Section with overall statistics for the scope of control: Gives the number of clusters with KSPM connection errors, numbers of clusters with security warnings, number of Tops clusters with warnings, and number of violations.

    • A list of alerts stating threat type, status, and last update time.

      For each security rule violation, an alert is created with a detailed description of the violation, severity, detection time, list of affected resources and troubleshooting recommendations.

      You can manage troubleshooting for each specific alert:

      • Assign persons responsible for troubleshooting.
      • Manage the alert status.
      • Leave comments.
      • Keep track of troubleshooting progress.
      • Request analysis from the AI assistant.

Was the article helpful?

Previous
Activating KSPM
Next
Viewing control rules
© 2025 Direct Cursus Technology L.L.C.