Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Security in Yandex Cloud
  • Key security principles
  • Division of responsibility for security
  • Compliance
  • Security measures on the Yandex Cloud side
  • Security tools available to cloud service users
    • All sections on one page
    • Introduction
    • Authentication and access management
    • Session and cookie security
    • Monitoring and audit
    • Data encryption and protection
    • Integrations and third-party solutions
  • User support policy during vulnerability scanning
  • Security bulletins
  • Public IP address ranges

In this article:

  • Monitoring and audit
  • Organization users who last logged in more than 30 days ago are blocked
  • Monitoring of audit log events is set up
  1. Yandex 360 protection and safe use standard, version 1.0.0
  2. Monitoring and audit
Written by
Yandex Cloud
Updated at September 17, 2025
  • Monitoring and audit
    • Organization users who last logged in more than 30 days ago are blocked
    • Monitoring of audit log events is set up

Monitoring and auditMonitoring and audit

Organization users who last logged in more than 30 days ago are blockedOrganization users who last logged in more than 30 days ago are blocked

Y360-5

To minimize the risks of unauthorized access, you should regularly audit user activity. We recommend blocking or deleting accounts that were inactive for more than 30 days. This especially concerns organizations with high turnover of staff, contractors, or temporary employees.

Before implementing this measure, make sure the session cookie lifetime in your organization is limited according to the Y360-2 standard. This is required for accurate evaluation of user activity.

Checking via the API

To get a list of events in the organization’s audit log, use the get-logs REST API method for the audit-logs resource. Make sure the occurred_at parameter value in the response body does not exceed 30 days.

How to implement:

For added security, we recommend blocking or deleting user accounts that were inactive for more than 30 days, provided you comply with the Y360-2 standard for session cookies.

How to block or unblock an employee.

How to delete an employee account.

Monitoring of audit log events is set upMonitoring of audit log events is set up

Y360-11

This recommendation mandates collection and analysis of audit log events in order to detect potentially dangerous actions and anomalies in the system. Such events may include information about access to files, user activity, system logins, and other actions.

Admins and managers can use audit logs to look into:

  1. Events in services:

    • How employees log in to their accounts, e.g., the time and device of their login.
    • Actions employees take with emails and files in their Mail and Disk. For example, you can find out who has moved an email or file.
  2. Events in the organization’s profile:

    • Changes in the organization’s profile. For example, you can view what changed in a user’s data and who made those changes.
    • Past searches of other admins in the email archive and how they set up email rules.
Checking from the Yandex 360 console
  1. Log in as the organization administrator.

  2. In the left-hand menu, select Audit logs.

    If you see the Connect button, your configuration does not comply with Y360-11.

How to implement:

To ensure system security, enable collection and analysis of audit log events. This will allow you to timely detect and respond to potential threats.

Was the article helpful?

Previous
Session and cookie security
Next
Data encryption and protection
© 2025 Direct Cursus Technology L.L.C.