Kubernetes Security Posture Management (KSPM)
What Kubernetes environments does Mitigant KSPM support?
â
Mitigant KSPM works with all Kubernetes distributions:
Managed Kubernetes:
- Amazon EKS (Elastic Kubernetes Service)
- Azure AKS (Azure Kubernetes Service)
- Google GKE (Google Kubernetes Engine)
Self-Hosted Kubernetes:
- Vanilla Kubernetes clusters
- OpenShift
- Rancher
- K3s
- MicroK8s
Hybrid Environments:
- Mix of managed and self-hosted
- Multi-cluster deployments
- Edge Kubernetes installations
Architecture Support:
- Single clusters
- Multi-cluster federation
- Multiple clusters across clouds
â
How does Mitigant KSPM detect misconfigurations in Kubernetes?
Mitigant KSPM uses a lightweight agent installed as an operator for Kubernetes cluster monitoring:
What it monitors:
- Pod security configurations (privileged containers, host namespaces, etc.)
- RBAC policies and service account permissions
- Network policies and ingress/egress rules
- Secrets management and storage
- Resource limits and quotas
- Image configurations and vulnerabilities (with EPSS and KEV intelligence for prioritization)
- API server settings
- etcd security
- Node configurations
- Registry security assessments
How it works:
- Lightweight operator deployed in the cluster
- Continuous assessment of cluster state
- Compares configurations against security best practices
- Maps findings to Kubernetes-specific benchmarks
- Integrates vulnerability intelligence (EPSS and KEV) for risk-based prioritization
Minimal performance impact:
- Lightweight agent with small resource footprint
- No impact on application workloads
- Works with existing cluster permissions
â
Can Mitigant KSPM prioritize vulnerabilities by exploitability?
Yes. Mitigant KSPM includes advanced vulnerability prioritization:
â
How prioritization works:
- Scans container images for known CVEs
- Integrates vulnerability intelligence using EPSS (Exploit Prediction Scoring System) and KEV (Known Exploited Vulnerabilities)
- Assesses runtime context (is the container actually running?)
- Evaluates network exposure (is it internet-facing?)
- Considers privileges (does it run as root?)
- Checks for active exploits in the wild
â
Prioritization factors:
- Severity: CVSS score
- Exploitability: EPSS score and KEV catalog inclusion
- Exposure: Is the workload accessible?
- Context: What privileges does the container have?
- Validation: Can CAE prove it's exploitable?
â
Integration with CAE:
- KSPM finds container vulnerabilities
- CAE validates whether they're exploitable in your specific environment
- Reduces noise by focusing on validated risks
This approach dramatically reduces the vulnerability backlog by focusing on what actually matters.
â
How does Mitigant KSPM handle multi-cluster environments?
Mitigant KSPM provides centralized visibility across all clusters:
â
Multi-Cluster Features:
- Single dashboard showing all clusters
- Unified policy enforcement
- Consistent compliance monitoring
- Cross-cluster comparison and benchmarking
- Aggregated reporting
â
Cluster Organization:
- Group clusters by environment (dev/staging/prod)
- Tag clusters by team or business unit
- Filter by cloud provider or region
- Create custom cluster hierarchies
â
Use Cases:
- Monitor security posture across 10s or 100s of clusters
- Ensure consistent security policies
- Identify configuration drift between clusters
- Centralized compliance reporting
- Track security metrics across the entire K8s estate
â
Still have questions?
Additional Resources:
About Mitigant
â
Mitigant is a German cybersecurity company pioneering cloud security validation through attack emulation and Security Chaos Engineering. Founded by researchers from Hasso Plattner Institute with over 20 years of combined cloud security experience, Mitigant provides an integrated security platform combining CSPM, KSPM, and Cloud Attack Emulation.
â
The platform enables organizations of all sizes to proactively verify the readiness and resilience of their cloud-native infrastructures across AWS, Azure, and Kubernetes against potential cyber threats. By combining continuous posture management with attack validation based on MITRE ATT&CK and ATLAS frameworks, Mitigant helps detect and remediate security blind spots within cloud security strategies, tools, and teams.
â
Contact Information
- Website: https://www.mitigant.io
- Email: contact@mitigant.io
- Sign Up: https://www.mitigant.io/en/sign-up
â
Partnerships & Recognition
- Strategic partner with German Federal Office for Information Security (BSI)
- Selected for Google for Startups Growth Academy: AI for Cybersecurity
- Member of Digital Hub Bonn
- Strategic partnerships with GlobalDots, Future Spirits, Syself, and Fogbyte
Last Updated: November 2025




