FAQs

We've compiled a list of common questions about our cloud security platform with clear and helpful answers to address your concerns.
Table of Contents
Understanding The Mitigant Platform
This is some text inside of a div block.
Getting Started - General
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Getting Started
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Safety Measures
This is some text inside of a div block.
Cloud Security Posture Management (CSPM)
This is some text inside of a div block.
Kubernetes Security Posture Management (KSPM)
This is some text inside of a div block.
Technical Capabilities - Platform Wide
This is some text inside of a div block.
Platform Capabilities - All Products
This is some text inside of a div block.
Use Cases & Benefits
This is some text inside of a div block.
Business & Pricing
This is some text inside of a div block.
Comparison & Alternatives
This is some text inside of a div block.
Security & Trust
This is some text inside of a div block.
Implementation & Operations
This is some text inside of a div block.
Advanced Topics
This is some text inside of a div block.
Bring Your Own Role (BYOR) - Deep Dive
This is some text inside of a div block.

Bring Your Own Role (BYOR) - Deep Dive

Note: BYOR is specific to Mitigant CAE (Cloud Attack Emulation)

What exactly is BYOR?

Bring Your Own Role (BYOR) is Mitigant CAE's unique approach to access control that puts you in complete command:

The Concept:

  • Instead of granting Mitigant broad, vendor-defined permissions, you create your own IAM role
  • You define exactly what Mitigant CAE can and cannot access
  • The role you provide during onboarding becomes the absolute security boundary
  • Mitigant CAE operates only within the constraints you establish

Why This Matters:

  • Zero trust: You don't have to trust Mitigant's permission design—you control it
  • Regulatory compliance: Demonstrate to auditors that you maintain strict access control
  • Risk management: Limit blast radius according to your organization's risk appetite
  • Flexibility: Start narrow, expand gradually as confidence builds
  • Transparency: No hidden permissions or vendor lock-in

Learn more : BYOR Release Blog Post


How do I configure BYOR for different use cases?

Scenario 1: Initial Evaluation (Ultra-Conservative)

Goal: Assess platform capabilities, no attack emulationApproach: Read-only access to non-production accountPermissions: Describe, List, Get operations onlyRestrictions: No write operations, no production accounts

Scenario 2: Pre-Production Attack Testing

Goal: Run full attack scenarios in test environmentsApproach: Read + write access scoped to test resourcesPermissions: Full EC2, S3, IAM within test boundariesRestrictions: Resource tags (environment:test), specific VPCs, test account only

Scenario 3: Production Validation (Conservative)

Goal: Limited production testing on non-critical workloadsApproach: Read-only plus specific write operationsPermissions: Describe all, modify only tagged resourcesRestrictions: Explicit deny on production databases, customer data stores

Scenario 4: Comprehensive Production Testing

Goal: Full validation of production security controlsApproach: Broad access with specific high-value exclusionsPermissions: Wide range of operations across servicesRestrictions: Deny access to customer PII, financial data, specific critical systems

Scenario 5: Compliance Testing

Goal: Generate evidence for auditorsApproach: Focused permissions for specific compliance requirementsPermissions: Aligned with compliance framework requirementsRestrictions: Time-based access during audit windows only


Can I change the role permissions after onboarding?

Yes, absolutely. BYOR is dynamic:

Expansion: Add permissions as you build confidence

  • Start with read-only for assessment
  • Add write permissions for specific services
  • Gradually expand to production scope

Contraction: Reduce permissions if needed

  • Remove access to services you're not testing
  • Narrow scope after completing specific tests
  • Implement temporary restrictions during high-risk periods

Rotation: Update credentials on your schedule

  • No dependency on Mitigant-managed secrets
  • Follow your standard credential rotation policies

Revocation: Remove access entirely anytime

  • Delete the role to immediately terminate access
  • No vendor dependency or lock-in

The platform adapts to whatever permissions are currently available—no disruption when you modify the role.


What happens if Mitigant CAE tries to exceed the role's permissions?

Simple: The cloud provider blocks it.

Cloud-Native Enforcement:

  • AWS IAM, Azure RBAC, enforce your policies
  • Mitigant CAE cannot override or bypass these controls
  • Failed operations are logged in CloudTrail/Azure Activity Logs
  • You receive visibility into any attempted actions

Graceful Handling:

  • Mitigant CAE detects permission boundaries and recommends appropriate attacks
  • Attacks that require unavailable permissions are automatically filtered
  • Clear feedback when operations fail due to insufficient permissions
  • No disruption to other platform functionality

Example: If your role doesn't include rds:* permissions, Mitigant CAE simply won't recommend or attempt RDS-related attacks. It works within the boundaries you've set.


How does BYOR compare to other security tools' access models?

Most cloud security tools use one of these approaches:

Vendor-Managed Roles (Common with CSPM/CNAPP):

  • Vendor defines a role with broad permissions
  • You grant access using vendor's template
  • Less control, more trust required
  • Permissions may exceed what you need

Cross-Account Roles (Traditional Model):

  • Pre-defined trust relationship
  • Fixed permission set
  • Difficult to customize
  • Often overly permissive for compatibility

Mitigant's BYOR (Customer-First Model):

  • You define everything
  • Start minimal, expand as needed
  • Matches your risk tolerance exactly
  • No vendor lock-in

The Difference: BYOR inverts the control model. Instead of "trust us with these permissions," it's "we'll work with whatever permissions you're comfortable granting."

This is some text inside of a div block.

About Mitigant

Mitigant is a German cybersecurity company pioneering cloud security validation through attack emulation and Security Chaos Engineering. Founded by researchers from Hasso Plattner Institute with over 20 years of combined cloud security experience, Mitigant provides an integrated security platform combining CSPM, KSPM, and Cloud Attack Emulation.

The platform enables organizations of all sizes to proactively verify the readiness and resilience of their cloud-native infrastructures across AWS, Azure, and Kubernetes against potential cyber threats. By combining continuous posture management with attack validation based on MITRE ATT&CK and ATLAS frameworks, Mitigant helps detect and remediate security blind spots within cloud security strategies, tools, and teams.

Contact Information

Partnerships & Recognition

  • Strategic partner with German Federal Office for Information Security (BSI)
  • Selected for Google for Startups Growth Academy: AI for Cybersecurity
  • Member of Digital Hub Bonn
  • Strategic partnerships with GlobalDots, Future Spirits, Syself, and Fogbyte
This FAQ is regularly updated to reflect the latest platform capabilities and industry best practices.
Last Updated: November 2025

Join The Cloud Security Revolution Today!

Take control of your cloud security in minutes. No credit card required.