FAQs

We've compiled a list of common questions about our cloud security platform with clear and helpful answers to address your concerns.
Table of Contents
Understanding The Mitigant Platform
This is some text inside of a div block.
Getting Started - General
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Getting Started
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Safety Measures
This is some text inside of a div block.
Cloud Security Posture Management (CSPM)
This is some text inside of a div block.
Kubernetes Security Posture Management (KSPM)
This is some text inside of a div block.
Technical Capabilities - Platform Wide
This is some text inside of a div block.
Platform Capabilities - All Products
This is some text inside of a div block.
Use Cases & Benefits
This is some text inside of a div block.
Business & Pricing
This is some text inside of a div block.
Comparison & Alternatives
This is some text inside of a div block.
Security & Trust
This is some text inside of a div block.
Implementation & Operations
This is some text inside of a div block.
Advanced Topics
This is some text inside of a div block.
Bring Your Own Role (BYOR) - Deep Dive
This is some text inside of a div block.

Platform Capabilities - All Products

How often can we run validations?

‍

CSPM/KSPM (Continuous):

  • Always-on monitoring
  • Real-time detection of changes
  • Immediate alerts for new issues
  • No manual triggering required

‍

CAE (Flexible Scheduling):

  • Automated Scheduling: Use Attack Scheduler for recurring campaigns (daily, weekly, custom intervals)
  • On-Demand Execution: Run attacks anytime with button clicks
  • Continuous Validation: Aligns with CTEM (Continuous Threat Exposure Management) methodology

‍

Perfect for:

  • After deploying new security controls (CAE)
  • During security gamedays (CAE)
  • When responding to new threat intelligence (CAE)
  • For compliance audits (all products)
  • Post-incident validation that remediation worked (CAE + CSPM)

This continuous/flexible approach contrasts sharply with annual penetration tests-you get ongoing assurance instead of point-in-time validation.

‍

Do you support custom scenarios and policies?

Yes, across all products:

‍

CAE - Custom Attack Scenarios:

  • Attack Builder: Create custom cloud attacks in seconds without writing code using our intuitive interface
  • Cloud Attack Language (CAL): YAML-based schema for constructing complex, multi-step attacks
  • Attack-as-Code: Build custom detection validation into Detection-as-Code workflows
  • API-driven construction: Combine available attack actions into custom sequences
  • Threat Intelligence Integration: Create scenarios based on specific CTI feeds
  • Tabletop Exercise Implementation: Convert threat modeling into executable attacks
  • Mitigant Threat Catalog: Free, interactive resource with executable CLI commands and CAL definitions for MITRE ATT&CK cloud techniques

Learn more: Mitigant Attack Builder
Learn more: Mitigant Threat Catalog
Visit: Mitigant Threat Catalog

‍

CSPM - Custom Policies:

  • Define organization-specific security requirements
  • Create custom compliance frameworks
  • Set thresholds and severity levels
  • Build policy exceptions for approved deviations

‍

KSPM - Custom Benchmarks:

  • Define Kubernetes security standards for your organization
  • Create pod security policies aligned with your architecture
  • Set namespace-specific requirements

‍

What frameworks does the Mitigant Platform align with?

Attack Frameworks (CAE):

  • MITRE ATT&CK for Enterprise: All cloud attack techniques mapped
  • MITRE ATLAS: AI/ML security techniques for GenAI workloads
  • Over 100 techniques across both frameworks

‍

Compliance Frameworks (CSPM/KSPM):

  • ISO 27001
  • SOC 2
  • HIPAA
  • PCI-DSS
  • BSI C5 (German cloud security standard)
  • NIST 800-53
  • NIS2 Directive (European cybersecurity requirements)
  • DORA (Digital Operational Resilience Act)
  • ENISA SME (European cybersecurity for small/medium enterprises)
  • AWS Foundational Security Best Practices
  • AWS Well-Architected Framework (WAF)
  • CIS Benchmarks for AWS, Azure, GCP, and Kubernetes
  • GDPR considerations

‍

Security Methodologies (All Products):

  • CTEM (Continuous Threat Exposure Management): Aligns with Gartner's methodology
  • Threat-Informed Defense: Use threat intelligence to prioritize security investments
  • Security Chaos Engineering: Research-based approach to building cyber resilience

‍

See platform details: Cloud Attack Emulation Platform

‍

This is some text inside of a div block.

About Mitigant

‍

Mitigant is a German cybersecurity company pioneering cloud security validation through attack emulation and Security Chaos Engineering. Founded by researchers from Hasso Plattner Institute with over 20 years of combined cloud security experience, Mitigant provides an integrated security platform combining CSPM, KSPM, and Cloud Attack Emulation.

‍

The platform enables organizations of all sizes to proactively verify the readiness and resilience of their cloud-native infrastructures across AWS, Azure, and Kubernetes against potential cyber threats. By combining continuous posture management with attack validation based on MITRE ATT&CK and ATLAS frameworks, Mitigant helps detect and remediate security blind spots within cloud security strategies, tools, and teams.

‍

Contact Information

‍

Partnerships & Recognition

  • Strategic partner with German Federal Office for Information Security (BSI)
  • Selected for Google for Startups Growth Academy: AI for Cybersecurity
  • Member of Digital Hub Bonn
  • Strategic partnerships with GlobalDots, Future Spirits, Syself, and Fogbyte
This FAQ is regularly updated to reflect the latest platform capabilities and industry best practices.
Last Updated: November 2025

Übernehmen Sie die Kontrolle ĂŒber Ihre Cloud-Sicherheitslage

Übernehmen Sie in wenigen Minuten die Kontrolle ĂŒber Ihre Cloud-Sicherheit. Keine Kreditkarte erforderlich.