Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Security Deck
    • All guides
      • Overview
      • Activating KSPM
      • Working with a dashboard
      • Viewing control rules
      • Managing exceptions to control rules
  • Pricing policy
  • Audit Trails events
  • Release notes
  1. Step-by-step guides
  2. Kubernetes® Security Posture Management (KSPM)
  3. Viewing control rules

Viewing Kubernetes control rules

Written by
Yandex Cloud
Updated at February 2, 2026

Note

This feature is at the Preview stage.

To view Kubernetes control rules, you need the security-deck.viewer role or higher for the folder containing the KSPM module resources.

To view active Kubernetes control rules:

Security Deck UI
  1. Go to Yandex Security Deck.

  2. In the left-hand panel, select Control rules.

  3. At the top of the window, click More and select the workspace for which you want to view the rule info. Use search, if required.

  4. On the Security control rules page that opens, go to the Kubernetes{trademark} tab. The section that opens lists the control rules that form a part of the security standards specified for the current workspace.

    For each rule, the table displays the following information:

    Tip

    If you need to, you can change the info columns displayed in the table. Do it by clicking in the row with the table column headers, selecting the info columns you need, and clicking Apply.

    • : Rule criticality level; this icon indicates how security-critical the rule is:

      • : Remark
      • : Low severity
      • : Medium severity
      • : High severity
    • Control rule: Rule name and brief summary.

    • Rule sets: Icon(s) for the security standards that are using this rule. If the icon is colored, it means the rule is checked for the corresponding standard. If the icon is gray, it means it is not.

    • Verification method: How the infrastructure controlled in the workspace is checked for compliance with this rule:

      • automatic
      • manual
    • ID: Rule ID in Yandex Cloud.

    • Violations: Number of rule violations detected.

  5. To view detailed information about a specific rule, click the table row with its name. The detailed info window that opens includes the following tabs:

    Overview
    Violations
    Recommendations

    In addition to the data shown in the general rule info table, the Overview tab contains:

    • Date and time of the most recent security check.
    • Details on the monitored features, their configurations, or actions performed with them.

    The Violations tab lists security violations detected during checks. Detected violations will not appear in this list if they satisfy the exception criteria specified for the rule.

    The Recommendations tab provides guides and solutions to assist you with rule compliance.

Was the article helpful?

Previous
Working with a dashboard
Next
Managing exceptions to control rules
© 2026 Direct Cursus Technology L.L.C.