Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Security in Yandex Cloud
  • Key security principles
  • Division of responsibility for security
  • Compliance
  • Security measures on the Yandex Cloud side
  • Security tools available to cloud service users
    • All sections on one page
    • Introduction
    • Authentication and access management
    • Session and cookie security
    • Monitoring and audit
    • Data encryption and protection
    • Integrations and third-party solutions
  • User support policy during vulnerability scanning
  • Security bulletins
  • Public IP address ranges

In this article:

  • Introduction
  • Scope
  • Standard structure
  • Requirements and preparation
  • Limitation of responsibility
  • Terms and abbreviations
  1. Yandex 360 protection and safe use standard, version 1.0.0
  2. Introduction

Yandex 360 protection and safe use standard, version 1.0.0

Written by
Yandex Cloud
Updated at September 17, 2025
  • Introduction
    • Scope
    • Standard structure
    • Requirements and preparation
    • Limitation of responsibility
    • Terms and abbreviations

IntroductionIntroduction

This document offers recommendations for means of technical protection and helps you choose adequate information security measures when using Yandex 360 services.

The recommendations and security measures mentioned in this standard come with links to the APIs and solutions for setting up secure configurations using standard information security tools.

The standard describes the methods and means of verifying compliance with the recommendations, including:

  • Yandex 360 UI
  • API Yandex 360

ScopeScope

These recommendations are addressed to administrators, technical specialists, and information security specialists responsible for the security of information systems built around Yandex 360 services.

The standard can be used as the basis for developing company-specific recommendations. Not all of the information security measures and recommendations from this document are applicable. Moreover, additional measures and recommendations that are not included in the current standard may be required.

Standard structureStandard structure

The standard describes recommendations for the following security objectives:

  • Account and access permission management.
  • Two-factor authentication and account recovery.
  • Monitoring and analysis of audit logs.
  • Password policy and password management.
  • Restricting access to external services and applications.
  • Data protection and leak prevention.

Requirements and preparationRequirements and preparation

Prior to the checks, make sure that:

  • You have the necessary access permissions for the Yandex 360 APIs.
  • You are familiar with the documentation for the APIs in question.
  • You have access to audit logs and other necessary data.

You can automate the audit of compliance with all recommendations using Yandex 360 API-based scripts.

Limitation of responsibilityLimitation of responsibility

Yandex 360 uses the concept of shared responsibility. The limit of responsibility for security depends on the type of platform (SaaS model), built-in protection mechanisms, and policies made available by the provider.

As a service provider, Yandex is responsible for physical security of data centers, supporting a holistic fault-tolerant platform, network infrastructure protection, monitoring and analysis of system-level events, as well as implementation of the Security-by-Default mechanisms: data encryption, anti-spam and anti-DDoS tools, other inbuilt levels of protection.

The client (Organization 360 owner) contributes access setup and management functions: assigns roles (users, managers, admins), implements password policies, enables two-factor authentication, configures networking rules for services (e.g., Yandex Telemost), performs data processing and classification, backups and audits of objects within the organization.

The provider thus guarantees the infrastructure-level security and stability, whereas the client ensures reliable configuration, access control, and data protection within their SaaS organization.

Terms and abbreviationsTerms and abbreviations

This document uses the terms and definitions used in the Yandex 360 documentation, as well as generally accepted terms in the field of information security.

Was the article helpful?

Previous
All sections on one page
Next
Authentication and access management
© 2025 Direct Cursus Technology L.L.C.