FAQs

We've compiled a list of common questions about our cloud security platform with clear and helpful answers to address your concerns.

Security & Trust

How secure is the Mitigant Platform itself?

As a security platform, Mitigant takes its own security seriously:

Architecture:

  • SaaS platform hosted in secure cloud infrastructure
  • Agentless design minimizes attack surface
  • API-based access with least-privilege principles
  • BYOR (CAE) ensures customer-controlled security boundaries

Access Control:

  • Role-based access control for team members
  • Audit logging of all user actions
  • Integration with identity providers
  • Customers control access through their own IAM policies (CAE)

Data Handling:

  • Attack telemetry and logs stored securely
  • Compliance with data privacy regulations
  • Data residency options available

Transparency:

  • All actions logged in your CloudTrail/Azure Activity Logs
  • No hidden permissions or backdoors
  • Open documentation of required access

For detailed security architecture documentation, security questionnaires, or SOC 2 reports, please contact our team.

What about data privacy?

Mitigant's agentless approach enhances privacy:

What Mitigant Accesses:

  • Cloud resource configurations
  • IAM policies and permissions
  • Network topology
  • Service settings
  • Kubernetes cluster configurations (KSPM)
  • Only what you explicitly grant through BYOR (CAE)

What Mitigant Doesn't Access:

  • Application data within workloads
  • Customer data in databases
  • File contents in storage
  • Personal information
  • Anything outside the role permissions you define (CAE)

During CAE Attack Emulations:

  • Data exfiltration is simulated, not performed
  • No actual customer data leaves your environment
  • Attacks validate capability to access, not actual access

Join The Cloud Security Revolution Today!

Take control of your cloud security in minutes. No credit card required.