FAQs

We've compiled a list of common questions about our cloud security platform with clear and helpful answers to address your concerns.
Table of Contents
Understanding The Mitigant Platform
This is some text inside of a div block.
Getting Started - General
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Getting Started
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Safety Measures
This is some text inside of a div block.
Cloud Security Posture Management (CSPM)
This is some text inside of a div block.
Kubernetes Security Posture Management (KSPM)
This is some text inside of a div block.
Technical Capabilities - Platform Wide
This is some text inside of a div block.
Platform Capabilities - All Products
This is some text inside of a div block.
Use Cases & Benefits
This is some text inside of a div block.
Business & Pricing
This is some text inside of a div block.
Comparison & Alternatives
This is some text inside of a div block.
Security & Trust
This is some text inside of a div block.
Implementation & Operations
This is some text inside of a div block.
Advanced Topics
This is some text inside of a div block.
Bring Your Own Role (BYOR) - Deep Dive
This is some text inside of a div block.

Comparison & Alternatives

How is Mitigant different from standalone CSPM tools?

Standalone CSPM Tools:

  • Identify misconfigurations
  • Provide compliance dashboards
  • Alert on policy violations
  • Stop there

Mitigant Platform (CSPM + CAE):

  • Identify misconfigurations (CSPM)
  • Validate exploitability (CAE)
  • Prove which issues are real vs. theoretical
  • Provide validated prioritization
  • Continuous red team validation

Example:

  • Standalone CSPM: "S3 bucket is public" → You get an alert
  • Mitigant: "S3 bucket is public" (CSPM) → "We accessed it and here's the data" (CAE) → You know it's critical

The integration is the differentiator.

Read this blog post for detailed comparison - CSPM Scans Are Not Cloud Penetration Tests: Understanding the Critical Differences


How does this compare to vulnerability scanners?

Different Focus:

  • Vulnerability scanners: Software vulnerabilities (CVEs)
  • Mitigant CSPM: Cloud misconfigurations, IAM issues
  • Mitigant KSPM: Container/Kubernetes vulnerabilities and misconfigurations
  • Mitigant CAE: Detection gaps, response readiness

Different Approach:

  • Vulnerability scanners: Passive scanning
  • Mitigant CAE: Active attack emulation

Complementary Value:

  • Use both together
  • Vulnerability scanners find CVEs
  • Mitigant validates cloud-specific security and proves exploitability

Read this blog post for detailed comparison - CSPM Scans Are Not Cloud Penetration Tests: Understanding the Critical Differences


What about other attack simulation tools?

Mitigant CAE differentiates through:

Cloud-Native Design:

  • Purpose-built for cloud environments (AWS, Azure, Kubernetes)
  • Understands cloud-specific attack patterns
  • Not adapted from traditional pen testing tools

Customer-Controlled Safety (BYOR):

  • You define the blast radius through IAM policies
  • No vendor lock-in or opaque permissions
  • Complete transparency and control

Integrated Platform:

  • Works seamlessly with CSPM and KSPM
  • Unified view of posture + validation
  • Single vendor, single platform

Realistic Attack Strategies:

  • Some attacks create resources (like real attackers do)
  • Others target existing resources
  • Most alternatives only create-then-destroy test resources

Enterprise-Grade:

  • Suitable for organizations of all sizes
  • Backed by academic research (Security Chaos Engineering)
  • Validated by partnerships with government agencies (BSI)

Read this blog posts for more details

This is some text inside of a div block.

About Mitigant

Mitigant is a German cybersecurity company pioneering cloud security validation through attack emulation and Security Chaos Engineering. Founded by researchers from Hasso Plattner Institute with over 20 years of combined cloud security experience, Mitigant provides an integrated security platform combining CSPM, KSPM, and Cloud Attack Emulation.

The platform enables organizations of all sizes to proactively verify the readiness and resilience of their cloud-native infrastructures across AWS, Azure, and Kubernetes against potential cyber threats. By combining continuous posture management with attack validation based on MITRE ATT&CK and ATLAS frameworks, Mitigant helps detect and remediate security blind spots within cloud security strategies, tools, and teams.

Contact Information

Partnerships & Recognition

  • Strategic partner with German Federal Office for Information Security (BSI)
  • Selected for Google for Startups Growth Academy: AI for Cybersecurity
  • Member of Digital Hub Bonn
  • Strategic partnerships with GlobalDots, Future Spirits, Syself, and Fogbyte
This FAQ is regularly updated to reflect the latest platform capabilities and industry best practices.
Last Updated: November 2025

Join The Cloud Security Revolution Today!

Take control of your cloud security in minutes. No credit card required.