FAQs

We've compiled a list of common questions about our cloud security platform with clear and helpful answers to address your concerns.

Advanced Topics

What is Security Chaos Engineering?

Security Chaos Engineering (SCE) is a research-based methodology that Mitigant pioneered for cloud environments and is the foundation of Mitigant CAE:

Core Concept:

  • Deliberately inject security faults (attacks) to test resilience
  • Observe how systems behave under attack
  • Identify blind spots before real attackers do

Builds on Chaos Engineering:

  • Traditional chaos engineering (like Netflix's Chaos Monkey) tests availability
  • Security Chaos Engineering extends this to confidentiality and integrity
  • Focuses on security failures, not just operational failures

Why It Matters:

  • 100% cybersecurity is impossible
  • Testing resilience is more realistic than pursuing perfection
  • Validates whether security controls actually work
  • Provides short feedback loops for evidence-based security

Research Foundation:

  • Mitigant's founders developed SCE through Ph.D. research at Hasso Plattner Institute
  • Published academic work validates the approach
  • Proven through industry partnerships

Learn more about the team: About Mitigant

Deep dive: Demystifying Security Chaos Engineering - Part I | Part II

What is Adversarial Exposure Validation?

Adversarial Exposure Validation (AEV) is Gartner's term for what Mitigant CAE provides:

The Concept:

  • Don't just identify vulnerabilities—validate which ones are exploitable
  • Focus on validated exposures rather than chasing every vulnerability
  • Prioritize based on actual risk, not theoretical CVSS scores

How Mitigant Enables AEV:

  • CSPM identifies potential exposures
  • CAE emulation proves exploitability
  • Contextual analysis shows which exposures matter in your specific environment
  • Reduces noise by filtering out theoretical risks

Benefits:

  • Reduce alert fatigue
  • Optimize security team time
  • Faster remediation of real risks
  • Better ROI on security investments

How does Mitigant support Threat-Informed Defense?

Threat-Informed Defense shifts security strategy from generic best practices to specific threats (primarily through Mitigant CAE):

Traditional Approach:

  • Implement all recommended security controls
  • Chase vulnerability metrics
  • React to every alert equally

Threat-Informed Approach:

  • Understand which threat actors target your industry
  • Emulate their specific techniques
  • Prioritize defenses against realistic threats

Mitigant's Implementation:

  • Attacks tagged with threat actor TTPs (CAE)
  • Select scenarios based on specific threat actors (e.g., Scattered Spider)
  • Integrate cyber threat intelligence feeds (CAE)
  • Validate defenses against known adversary behaviors (CAE)
  • CSPM ensures baseline security posture
  • KSPM validates container security

Partnership Example:

  • Collaboration with Sekoia.io demonstrated practical Threat-Informed Defense
  • Combined CTI with attack emulation for validated security

Learn more: Cloud Attack Emulation: Enhancing Cloud-Native Security with Threat-Informed Defense

How does this fit with CTEM?

CTEM (Continuous Threat Exposure Management) is Gartner's framework. The Mitigant Platform supports all CTEM stages:

1. Scoping: Identify assets and attack surface

  • CSPM/KSPM provides complete cloud visibility
  • Resource inventory across multi-cloud
  • Kubernetes workload discovery

2. Discovery: Find vulnerabilities and misconfigurations

  • CSPM: Continuous assessment of security posture
  • KSPM: Container vulnerability scanning
  • Compliance violation detection

3. Prioritization: Determine which exposures matter most

  • CAE: Attack emulation validates exploitability
  • Risk-based prioritization, not just CVSS scores
  • Focus on validated exposures

4. Validation: Prove security controls work

  • Core CAE capability
  • Continuous validation, not annual pen tests
  • Evidence-based security assurance

5. Mobilization: Remediate and communicate

  • Clear remediation steps provided (CSPM/KSPM)
  • Integration with Slack, Teams, Jira
  • Automated reporting (all products)

Mitigant's approach aligns perfectly with CTEM's emphasis on validated exposures and continuous testing.

See platform details: Cloud Attack Emulation Platform

Join The Cloud Security Revolution Today!

Take control of your cloud security in minutes. No credit card required.