Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Security Deck
    • All guides
      • Overview
      • Viewing control rules
      • Managing exceptions to control rules
  • Pricing policy
  • Audit Trails events
  • Release notes

In this article:

  • Viewing general information about security control rules
  • Viewing detailed information about security control rules
  1. Step-by-step guides
  2. Threat Detector (TD)
  3. Viewing control rules

Viewing Threat Detector (TD) security control rules

Written by
Yandex Cloud
Updated at May 5, 2026
  • Viewing general information about security control rules
  • Viewing detailed information about security control rules

The Threat Detector module's security control rules are used in the Security Deck workspaces. If you have no workspaces yet, create one.

Viewing general information about security control rulesViewing general information about security control rules

To view general information about Threat Detector's active security control rules:

Security Deck UI
  1. Go to Yandex Security Deck.

  2. In the left-hand panel, select  Rules and exceptions.

  3. At the top of the window, select the workspace for which you want to view the rule info.

  4. On the Security control rules page that opens, go to the Threat Detector tab. The section that opens lists Threat Detector control rules for the current workspace.

    For each rule, the table displays the following information:

    Tip

    If required, you can modify the information columns displayed in the table. Do it by clicking in the row with the table column headers, selecting the info columns you need, and clicking Apply.

    • : Rule criticality level; this icon indicates how security-critical the rule is:

      • : Remark
      • : Low severity.
      • : Medium severity.
      • : High severity.
    • Control rule: Rule name and brief summary. To learn more about a rule, click the table row with its name.

    • Rule sets: Icon(s) for the security standards that are using this rule. If the icon is colored, it means the rule is checked for the corresponding standard. If the icon is gray, it means it is not.

    • **Rule type
      **: How the infrastructure controlled in the workspace is checked for compliance with this rule:

      • Automatic: Rule is checked automatically once every eight hours.
      • Manual: Rule has to be checked manually. Click the row with the rule to find a guide and details.
    • ID: Rule ID in Yandex Cloud.

Viewing detailed information about security control rulesViewing detailed information about security control rules

To view detailed information about a specific Threat Detector security control rule:

Security Deck UI
  1. Go to Yandex Security Deck.
  2. In the left-hand panel, select  Rules and exceptions.
  3. At the top of the window, select the workspace for which you want to view the rule info.
  4. On the Security control rules page that opens, go to the Threat Detector tab. The section that opens lists Threat Detector control rules for the current workspace.
  5. To learn more about a security control rule, click the table row with its name. You will see a window with rule details, which has the following tabs:

    Overview
    Exceptions
    Recommendations

    The Overview tab contains:

    • Rule category (ID of the Security Deck module that uses the rule).

    • Rule ID.

    • Set of security requirements the rule applies to.

    • Date and time of the most recent security check.

    • Rule type (check method):

      • Automatic: Rule is checked automatically once every eight hours.
      • Manual: Rule has to be checked manually.
    • Details on the monitored features, their configurations, or actions performed with them.

    The Exceptions tab lists all exceptions defined for the rule along with controls for exception management.

    The Recommendations tab provides guides and solutions to assist you with rule compliance.

See alsoSee also

  • Managing exceptions from Threat Detector (TD) security rules
  • Threat Detector (TD)
  • Security Deck workspaces

Was the article helpful?

Previous
Overview
Next
Managing exceptions to control rules
© 2026 Direct Cursus Technology L.L.C.