FAQs

We've compiled a list of common questions about our cloud security platform with clear and helpful answers to address your concerns.
Table of Contents
Understanding The Mitigant Platform
This is some text inside of a div block.
Getting Started - General
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Getting Started
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Safety Measures
This is some text inside of a div block.
Cloud Security Posture Management (CSPM)
This is some text inside of a div block.
Kubernetes Security Posture Management (KSPM)
This is some text inside of a div block.
Technical Capabilities - Platform Wide
This is some text inside of a div block.
Platform Capabilities - All Products
This is some text inside of a div block.
Use Cases & Benefits
This is some text inside of a div block.
Business & Pricing
This is some text inside of a div block.
Comparison & Alternatives
This is some text inside of a div block.
Security & Trust
This is some text inside of a div block.
Implementation & Operations
This is some text inside of a div block.
Advanced Topics
This is some text inside of a div block.
Bring Your Own Role (BYOR) - Deep Dive
This is some text inside of a div block.

Advanced Topics

What is Security Chaos Engineering?

Security Chaos Engineering (SCE) is a research-based methodology that Mitigant pioneered for cloud environments and is the foundation of Mitigant CAE:

Core Concept:

  • Deliberately inject security faults (attacks) to test resilience
  • Observe how systems behave under attack
  • Identify blind spots before real attackers do

Builds on Chaos Engineering:

  • Traditional chaos engineering (like Netflix's Chaos Monkey) tests availability
  • Security Chaos Engineering extends this to confidentiality and integrity
  • Focuses on security failures, not just operational failures

Why It Matters:

  • 100% cybersecurity is impossible
  • Testing resilience is more realistic than pursuing perfection
  • Validates whether security controls actually work
  • Provides short feedback loops for evidence-based security

Research Foundation:

  • Mitigant's founders developed SCE through Ph.D. research at Hasso Plattner Institute
  • Published academic work validates the approach
  • Proven through industry partnerships

Learn more about the team: About Mitigant

Deep dive: Demystifying Security Chaos Engineering - Part I | Part II


What is Adversarial Exposure Validation?

Adversarial Exposure Validation (AEV) is Gartner's term for what Mitigant CAE provides:

The Concept:

  • Don't just identify vulnerabilities—validate which ones are exploitable
  • Focus on validated exposures rather than chasing every vulnerability
  • Prioritize based on actual risk, not theoretical CVSS scores

How Mitigant Enables AEV:

  • CSPM identifies potential exposures
  • CAE emulation proves exploitability
  • Contextual analysis shows which exposures matter in your specific environment
  • Reduces noise by filtering out theoretical risks

Benefits:

  • Reduce alert fatigue
  • Optimize security team time
  • Faster remediation of real risks
  • Better ROI on security investments

Read more about AEV in our detailed blog post.


How does Mitigant support Threat-Informed Defense?

Threat-Informed Defense shifts security strategy from generic best practices to specific threats (primarily through Mitigant CAE):

Traditional Approach:

  • Implement all recommended security controls
  • Chase vulnerability metrics
  • React to every alert equally

Threat-Informed Approach:

  • Understand which threat actors target your industry
  • Emulate their specific techniques
  • Prioritize defenses against realistic threats

Mitigant's Implementation:

  • Attacks tagged with threat actor TTPs (CAE)
  • Select scenarios based on specific threat actors (e.g., Scattered Spider)
  • Integrate cyber threat intelligence feeds (CAE)
  • Validate defenses against known adversary behaviors (CAE)
  • CSPM ensures baseline security posture
  • KSPM validates container security

Partnership Example:

  • Collaboration with Sekoia.io demonstrated practical Threat-Informed Defense
  • Combined CTI with attack emulation for validated security

Learn more: Cloud Attack Emulation: Enhancing Cloud-Native Security with Threat-Informed Defense


How does this fit with CTEM?

CTEM (Continuous Threat Exposure Management) is Gartner's framework. The Mitigant Platform supports all CTEM stages:

1. Scoping: Identify assets and attack surface

  • CSPM/KSPM provides complete cloud visibility
  • Resource inventory across multi-cloud
  • Kubernetes workload discovery

2. Discovery: Find vulnerabilities and misconfigurations

  • CSPM: Continuous assessment of security posture
  • KSPM: Container vulnerability scanning
  • Compliance violation detection

3. Prioritization: Determine which exposures matter most

  • CAE: Attack emulation validates exploitability
  • Risk-based prioritization, not just CVSS scores
  • Focus on validated exposures

4. Validation: Prove security controls work

  • Core CAE capability
  • Continuous validation, not annual pen tests
  • Evidence-based security assurance

5. Mobilization: Remediate and communicate

  • Clear remediation steps provided (CSPM/KSPM)
  • Integration with Slack, Teams, Jira
  • Automated reporting (all products)

Mitigant's approach aligns perfectly with CTEM's emphasis on validated exposures and continuous testing.

See platform details: Cloud Attack Emulation Platform

Read the following blog posts for details:

This is some text inside of a div block.

About Mitigant

Mitigant is a German cybersecurity company pioneering cloud security validation through attack emulation and Security Chaos Engineering. Founded by researchers from Hasso Plattner Institute with over 20 years of combined cloud security experience, Mitigant provides an integrated security platform combining CSPM, KSPM, and Cloud Attack Emulation.

The platform enables organizations of all sizes to proactively verify the readiness and resilience of their cloud-native infrastructures across AWS, Azure, and Kubernetes against potential cyber threats. By combining continuous posture management with attack validation based on MITRE ATT&CK and ATLAS frameworks, Mitigant helps detect and remediate security blind spots within cloud security strategies, tools, and teams.

Contact Information

Partnerships & Recognition

  • Strategic partner with German Federal Office for Information Security (BSI)
  • Selected for Google for Startups Growth Academy: AI for Cybersecurity
  • Member of Digital Hub Bonn
  • Strategic partnerships with GlobalDots, Future Spirits, Syself, and Fogbyte
This FAQ is regularly updated to reflect the latest platform capabilities and industry best practices.
Last Updated: November 2025

Join The Cloud Security Revolution Today!

Take control of your cloud security in minutes. No credit card required.