FAQs

We've compiled a list of common questions about our cloud security platform with clear and helpful answers to address your concerns.
Table of Contents
Understanding Mitigant's Product Suite
This is some text inside of a div block.
Getting Started - General
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Getting Started
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Safety Measures
This is some text inside of a div block.
Cloud Security Posture Management (CSPM)
This is some text inside of a div block.
Kubernetes Security Posture Management (KSPM)
This is some text inside of a div block.
Technical Capabilities - Platform Wide
This is some text inside of a div block.
Platform Capabilities - All Products
This is some text inside of a div block.
Use Cases & Benefits
This is some text inside of a div block.
Business & Pricing
This is some text inside of a div block.
Comparison & Alternatives
This is some text inside of a div block.
Security & Trust
This is some text inside of a div block.
Implementation & Operations
This is some text inside of a div block.
Advanced Topics
This is some text inside of a div block.
Bring Your Own Role (BYOR) - Deep Dive
This is some text inside of a div block.

Understanding Mitigant's Product Suite

The Mitigant Security Platform is an integrated cloud security solution that combines continuous posture management with proactive attack validation. The platform consists of three core products that work together to provide comprehensive cloud security:

Mitigant CSPM (Cloud Security Posture Management)

What it does:

  • Continuously assesses cloud configurations for misconfigurations and compliance violations
  • Monitors security posture across AWS, Azure, and GCP (coming soon)
  • Provides clear remediation guidance with step-by-step instructions
  • Tracks compliance with frameworks like ISO 27001, SOC 2, HIPAA, CIS Benchmarks, and NIS2, etc

How it works:

  • Agentless, read-only monitoring via cloud provider APIs
  • Automatic detection of violations against security best practices and compliance benchmarks
  • Automatic asset management and drift detection (infrastructure changes, e.g., resource creation, deletion, and modification. See details here - https://www.mitigant.io/en/blog/drift-management-in-cloud-infrastructure)
  • Real-time alerts for compliance violations

Ideal for:

  • Compliance teams ensuring regulatory adherence
  • Cloud architects maintaining security standards
  • Security engineers monitoring cloud infrastructure
  • Organizations requiring continuous compliance evidence


Mitigant KSPM (Kubernetes Security Posture Management)

What it does:

  • Specialized security and compliance monitoring for Kubernetes environments
  • Detects and remediates misconfigurations within clusters
  • Prioritizes container vulnerabilities based on risk (vulnerability intelligence e.g., EPSS and KEV integrated for easy prioritization)
  • Validates Kubernetes security best practices
  • Security assessment for Kubernetes registries

How it works:

  • Uses a lightweight agent installed as an operator for monitoring managed and self-hosted Kubernetes clusters.
  • Continuous assessment against Kubernetes benchmarks
  • Integration with container registries for image scanning
  • Multi-cluster visibility in a single platform

Ideal for:

  • DevOps teams managing containerized applications
  • Platform engineers running Kubernetes at scale
  • Organizations with cloud-native architectures
  • Teams using EKS, AKS, GKE, OpenShift, or self-hosted K8s


Mitigant CAE (Cloud Attack Emulation)

What it does:

  • Validates that your security controls actually work by emulating real-world attacks
  • Tests detection and response capabilities continuously
  • Proves which vulnerabilities are exploitable vs. theoretical
  • Democratizes red team/purple team capabilities
  • Simplifies AI red teaming by emulating attacks against Amazon Bedrock aligned with MITRE ATLAS

How it works:

  • Runs 200+ attack scenarios based on MITRE ATT&CK and ATLAS frameworks
  • Uses Bring Your Own Role (BYOR) for customer-controlled blast radius
  • Automatic rollback and recovery after each attack
  • Can run in pre-production or production with safety controls

Ideal for:

  • Security operations teams validating detection rules
  • Organizations without dedicated red/purple teams
  • Detection engineers testing SIEM/CDR effectiveness
  • Teams implementing Threat-Informed Defense strategies
  • AI Red Teaming


How They Work Together

The Integrated Approach:

  1. CSPM identifies misconfigurations and compliance gaps
  2. CAE validates whether those issues are actually exploitable
  3. KSPM provides specialized security for containerized workloads
  4. Together they deliver evidence-based security with validated exposures essentially aligned with CTEM (Continuous Threat Exposure Management)

Example Workflow:

  • CSPM detects an overly permissive S3 bucket policy
  • CAE emulates an attack to prove whether data can actually be accessed
  • Results show whether this is a critical issue or a theoretical risk
  • Remediation is prioritized based on validated exploitability
  • Sigma logic is provided to enable detection capabilities in threat detection systems

Shared Platform Benefits:

  • Single agentless deployment across all products (except KSPM)
  • Unified dashboard and reporting
  • Common integrations (SIEM, Slack, Teams, Jira)
  • Consistent compliance framework mapping
  • One vendor relationship for comprehensive cloud security

This is some text inside of a div block.

About Mitigant

Mitigant is a German cybersecurity company pioneering cloud security validation through attack emulation and Security Chaos Engineering. Founded by researchers from Hasso Plattner Institute with over 20 years of combined cloud security experience, Mitigant provides an integrated security platform combining CSPM, KSPM, and Cloud Attack Emulation.

The platform enables organizations of all sizes to proactively verify the readiness and resilience of their cloud-native infrastructures across AWS, Azure, and Kubernetes against potential cyber threats. By combining continuous posture management with attack validation based on MITRE ATT&CK and ATLAS frameworks, Mitigant helps detect and remediate security blind spots within cloud security strategies, tools, and teams.

Contact Information

Partnerships & Recognition

  • Strategic partner with German Federal Office for Information Security (BSI)
  • Selected for Google for Startups Growth Academy: AI for Cybersecurity
  • Member of Digital Hub Bonn
  • Strategic partnerships with GlobalDots, Future Spirits, Syself, and Fogbyte
This FAQ is regularly updated to reflect the latest platform capabilities and industry best practices.
Last Updated: November 2025

Übernehmen Sie die Kontrolle über Ihre Cloud-Sicherheitslage

Übernehmen Sie in wenigen Minuten die Kontrolle über Ihre Cloud-Sicherheit. Keine Kreditkarte erforderlich.