Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Yandex Smart Web Security
  • Getting started
    • Overview
    • Security profiles
    • WAF
    • ARL (request limit)
    • Rules
    • Conditions
    • Lists
    • Protecting domains
    • Logging
    • Quotas and limits
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Release notes

In this article:

  • External resource protection: how it works
  • Domain protection components
  • Proxy server
  • Domain
  • Additional security measures
  1. Concepts
  2. Protecting domains

Protecting web applications in an external infrastructure

Written by
Yandex Cloud
Updated at November 10, 2025
  • External resource protection: how it works
  • Domain protection components
    • Proxy server
    • Domain
  • Additional security measures

Note

Domain protection is at the Preview stage.

Smart Web Security enables protection of web applications deployed both in and beyond Yandex Cloud, e.g., in your internal infrastructure or on another hosting service. Smart Web Security provides various means to protect your infrastructure against cybersecurity threats at the application layer (L7) of the OSI model. These may include DDoS attacks, bot attacks, SQL injections, cross-site scripting, etc.

External resource protection: how it worksExternal resource protection: how it works

All external requests to a web application go through Smart Web Security. To decrypt and analyze HTTPS traffic, you need to upload the private key and certificate of the server the web application is running on to Certificate Manager. After analysis, malicious requests are blocked, while the others are redirected to the web application.

The web application admin has access to real-time traffic statistics, such as the total number of requests, number of requests blocked by different profiles, etc.

Domain protection componentsDomain protection components

Incoming traffic is filtered with reverse proxying. All HTTP requests from website visitors or a web app are redirected to the target resource via a Smart Web Security proxy server. One or more domains of the protected resource connect to the proxy server. You can assign a domain a security profile where you will set up anti-DDoS protection, a web application firewall (WAF) and, if you need to, limit the app load using Advanced Rate Limiter (ARL).

Essentially, to implement protection of web applications or backends, you need to configure a proxy server and a domain and also add a certificate for decrypting and checking HTTPS traffic.

Proxy serverProxy server

The proxy server acts as an intermediary for all user requests to your website or application. It has a dedicated public IP address for receiving requests, so your server's public IP address will be hidden from external users. The proxy server has a preconfigured load balancer, which ensures stable performance in case there are many external requests, and active basic DDoS protection.

Note

The proxy server has an MTU limit of 1,450 bytes for all packets.

For the proxy server to receive requests sent to your domain, you need to set up redirection. To do this, add an A record for the DNS in the following format: <proxy_server_IP_address> : <domain_address>. The proxy server's IP address will become available once it is created in the proxy server parameters. You can add an A record via your hosting provider account or domain registrar account. Also, you can delegate domain management to Yandex Cloud DNS. In which case A records are set up in Yandex Cloud.

It usually takes a few minutes to activate redirection. In some cases, this may take up to 24 hours.

A proxy server can only work with public IP addresses; the address of your target resource must be accessible from the external network.

You can add multiple proxy servers, for example, to separate the application's stable version from a version under development.

You can configure logging for each proxy server. You can write all logs or filter them to save space in the storage.

You can connect multiple domains to a proxy server. For details on the number of domains, see Quotas and limits Smart Web Security.

DomainDomain

When setting up the domain, you need to specify:

  • Domain address, which is your website or web application address purchased from your DNS or hosting provider. You must be authorized to manage DNS A records. You can use any domain name in ASCII or Punycode format.

  • Connection type used by your website, HTTPS or HTTP. The recommended option is HTTPS as it establishes an encrypted connection between a user and your application.

    When selecting the HTTPS protocol, you need to add a TLS certificate and a private key in PEM format. Smart Web Security will check the certificate's validity period and match with the key. An invalid certificate will not be uploaded.

    The certificate and key are used for terminating a TLS connection from a user to your web app. To verify traffic security, Smart Web Security will encrypt and analyze traffic.

    If HTTPS is not yet configured for your web application, you can get a Let's Encrypt certificate in Yandex Certificate Manager. You can do this in advance or when adding the domain.

    To obtain the Let's Encrypt certificate, you need to confirm your domain ownership. To do this, you need access to your account on your registrar’s website or to the host the domain is linked to.

    Also, you can use the unprotected HTTP, but we recommend using it for test purposes only. Normally, when users visit such websites, browsers warn them the website is not secure.

  • Target resources, which are web servers or backends to receive verified and secure traffic. For target resources, you must specify the IP address and port used by your web application.

    To send encrypted traffic from Smart Web Security to your application:

    • Enable HTTPS.

    • Specify an SNI, a host domain name domain for the TLS Server Name Indication extension. You can use any domain name in ASCII or Punycode format.

    • Add a trusted root CA for the certificate chain installed on backend endpoints. X.509 certificates in PEM format are supported. The certificate’s validity is not checked, so you need to control it yourself.

After setting up the domain, you can connect a security profile to it. A security profile contains rules for checking and filtering requests to your web application.

Additional security measuresAdditional security measures

To make sure your website or application gets only verified and secure requests from Smart Web Security:

  • Block all incoming requests.
  • Add only Yandex Cloud addresses to the list of allowed ones. The list of addresses will also be available in domain parameters under How to activate protection.

Was the article helpful?

Previous
Lists
Next
Logging
© 2025 Direct Cursus Technology L.L.C.