FAQs

We've compiled a list of common questions about our cloud security platform with clear and helpful answers to address your concerns.

Getting Started - General

What is the Mitigant Security Platform?

‍

Mitigant is an integrated cloud security platform that combines three products:

  • CSPM: Continuous cloud security posture management
  • KSPM: Kubernetes-specific security monitoring
  • CAE: Cloud attack emulation for security validation

‍

All three products share an agentless architecture, work across AWS and Azure, and integrate with your existing security tools.

‍

‍

Do you offer a free trial?

‍

Yes, for all products:

  • Free trial: Sign up at mitigant.io/sign-up to test the platform
  • Demo environment: Get hands-on experience without connecting your own cloud accounts
  • No credit card required for the demo environment

‍

You can trial CSPM, KSPM, and CAE individually or together based on your needs.

‍

‍

How long does implementation take?

‍

Implementation is fast across all products:

CSPM/KSPM:

  • AWS accounts: Approximately 10-15 minutes from signup to seeing security insights
  • Azure subscriptions: About 10 minutes for complete setup
  • Kubernetes clusters: 15-20 minutes for cluster onboarding

‍

CAE:

  • Same quick onboarding as CSPM (10-15 minutes)
  • Plus BYOR (Bring Your Own Role) configuration if running attack emulations (additional 10-15 minutes)
  • Can start with read-only enumeration attacks immediately

‍

All products are agentless, so there's no software to install on your infrastructure. (KSPM requires installation of a small agent for deeper analysis)

‍

‍

What's required to implement the Mitigant Platform?

‍

Mitigant is an agentless SaaS platform with minimal setup requirements:

Technical Requirements:

  • Cloud accounts on AWS, Azure and Kubernetes clusters
  • API access with appropriate permissions
  • No agents, software installations, or network appliances required

‍

Permissions by Product:

  • CSPM: Read-only permissions for resource discovery and assessment
  • KSPM: Read-only access to Kubernetes API
  • CAE: BYOR (Bring Your Own Role) - you define the permissions and blast radius. You can also use the standard roles with admin or non-admin access.

‍

Team Resources:

  • Minimal SecOps time for initial setup
  • Security engineers can start using the platform immediately after onboarding
  • No specialized red team expertise required for CAE

‍

Übernehmen Sie die Kontrolle ĂŒber Ihre Cloud-Sicherheitslage

Übernehmen Sie in wenigen Minuten die Kontrolle ĂŒber Ihre Cloud-Sicherheit. Keine Kreditkarte erforderlich.