Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Security in Yandex Cloud
  • Key security principles
  • Division of responsibility for security
  • Compliance
  • Security measures on the Yandex Cloud side
  • Security tools available to cloud service users
    • All sections on one page
    • Introduction
    • Authentication and access management
    • Network security
    • Secure virtual environment configuration
    • Data encryption and key management
    • Collecting, monitoring, and analyzing audit logs
    • Application security
    • Security Kubernetes
    • Versions
  • User support policy during vulnerability scanning
  • Security bulletins
  • Public IP address ranges

In this article:

  • Introduction
  • Scope
  • Standard structure
  • Requirements and preparation
  • Limitation of responsibility
  • Terms and abbreviations
  • IDs
  1. Cloud infrastructure security standard, version 1.4.2
  2. Introduction

Yandex Cloud infrastructure security standard, version 1.4.2

Written by
Yandex Cloud
Updated at October 29, 2025
  • Introduction
    • Scope
    • Standard structure
    • Requirements and preparation
    • Limitation of responsibility
    • Terms and abbreviations
    • IDs

IntroductionIntroduction

This document offers recommendations for means of technical protection and helps you choose adequate information security measures when deploying information systems in Yandex Cloud.

Yandex Cloud ensures the physical security of data centers. See a detailed description of its physical security measures. If critical data is transmitted outside Yandex Cloud, the customer is responsible for managing physical access at all data processing locations.

The recommendations and security measures mentioned in the standard come with links to the Guides and solutions for setting up secure resource configurations using standard and additional information security tools available to Yandex Cloud users.

The standard also describes the methods and means of verifying compliance with the recommendations, including:

  • Management console UI
  • Yandex Cloud CLI
  • Manually

ScopeScope

These recommendations are addressed to architects, technical specialists, and information security experts who employ the following services to develop protected cloud systems and security policies for the cloud platform:

  • Yandex Application Load Balancer
  • Yandex Audit Trails
  • Yandex Certificate Manager
  • Yandex Cloud DNS
  • Yandex Cloud Logging
  • Yandex Identity Hub
  • Yandex Compute Cloud
  • Yandex Container Registry
  • Yandex Identity and Access Management (IAM)
  • Yandex Key Management Service
  • Yandex Lockbox
  • Yandex Managed Service for ClickHouse®
  • Yandex Managed Service for GitLab
  • Yandex Managed Service for Kubernetes
  • Yandex StoreDoc
  • Yandex Managed Service for MySQL®
  • Yandex Managed Service for PostgreSQL
  • Yandex Managed Service for Valkey™
  • Yandex Managed Service for YDB
  • Yandex Network Load Balancer
  • Yandex Object Storage
  • Yandex Resource Manager
  • Yandex Smart Web Security
  • Yandex SmartCaptcha
  • Yandex Virtual Private Cloud

The standard can be used as the basis for developing company-specific recommendations. Not all of the information security measures and recommendations from this document are applicable. Moreover, additional measures and recommendations that are not included in the current standard may be required.

Standard structureStandard structure

The standard describes recommendations for the following security objectives:

  • Authentication and access management
  • Network security
  • Secure virtual environment configuration.
  • Data encryption and key management
  • Collecting, monitoring, and analyzing audit logs
  • Backup
  • Physical security
  • Application security
  • Kubernetes security

Requirements and preparationRequirements and preparation

Before you perform checks, make sure that:

  • You have the CLI is installed and configured according to this guide.
  • You have logged in to the management console.
  • The jq utility is installed.

You can automate the audit of compliance with all the recommendations using available solutions from our partners:

  • Cloud Advisor: Agentless CNAPP that provides vulnerability scanning, malware detection, configuration auditing, asset inventory, and compliance validation for VMs and containers.
  • Neocat: Cloud security management product by Neoflex. Operates as an isolated installation within the user's cloud perimeter and requires no administrator privileges.

Limitation of responsibilityLimitation of responsibility

Yandex Cloud uses the shared responsibility concept. Where the lines are drawn for who is responsible for security depends on the services used by the system in the cloud, their usage model, i.e., infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS), and the security tools and policies the cloud provider has in place.

Terms and abbreviationsTerms and abbreviations

This document uses the terms and definitions introduced in ISO/IEC 27000:2018 and ISO/IEC 29100:2011.

IDsIDs

Each check has an ID in the following format: ID:IAM1. These IDs are used to create links to standard sections for use in Cloud Security Posture Management (CSPM) tools and do not contain any other information.

ClickHouse® is a registered trademark of ClickHouse, Inc.

Was the article helpful?

Previous
All sections on one page
Next
Authentication and access management
© 2025 Direct Cursus Technology L.L.C.