Implementation & Operations
How long does a typical POC take?
A proof of concept typically follows this timeline:
Week 1-2: Setup & Initial Assessment
- Onboard 1-2 cloud accounts (takes 10-15 minutes each)
- Set up CSPM for continuous monitoring
- Configure KSPM if using Kubernetes
- Create and provide IAM role with initial permissions (BYOR for CAE)
- Run initial CSPM/KSPM assessment
- Start with enumeration attacks (CAE - harmless, read-only)
Week 3-4: Pre-Production Testing
- Analyze CSPM/KSPM findings
- Expand CAE permissions for write operations in test environments
- Run CAE attack scenarios in dev/test
- Validate platform capabilities
- Train security team on platform features
Week 5-8: Production Validation (Optional)
- Refine CAE role permissions for production scope
- Select non-critical workloads for CAE testing
- Run supervised attacks during maintenance windows
- Validate detection and response capabilities
- Measure detection gaps and remediation effectiveness
Week 9+: Scale Decision
- Evaluate results and ROI
- Adjust permissions and scope
- Decide on broader deployment
- Negotiate contract terms
Many customers are comfortable making a decision after 4-6 weeks of hands-on experience.
Do we need specialized skills to use the Mitigant Platform?
No specialized expertise required:
Who Can Use Mitigant:
- Cloud security engineers (all products)
- DevOps/platform engineers (KSPM, CSPM)
- Security analysts (all products)
- Detection engineers (CAE)
- Compliance teams (CSPM)
- Any team member responsible for cloud security
What Makes It Accessible:
- No coding required for running attacks (CAE)
- Pre-built attack scenarios based on MITRE ATT&CK (CAE)
- Automatic recommendations based on your environment (all products)
- Clear remediation guidance provided (CSPM/KSPM)
- Sigma rules included for detection engineers (CAE)
- BYOR setup uses standard IAM concepts familiar to cloud teams (CAE)
Learning Curve:
- Web-based interface is intuitive
- Attack execution is button-click simple (CAE)
- Interpretation of results is straightforward
- Documentation and support available
- IAM role configuration follows cloud best practices (CAE)
That said, understanding cloud architecture, security concepts, and IAM is helpful to maximize value from the platform.
Watch: Getting Started with Security Chaos Engineering (Webinar)
Can we run this in air-gapped environments?
The Mitigant Platform is designed as a SaaS solution requiring internet connectivity. For organizations with strict air-gap requirements, please contact us to discuss:
- Potential on-premises deployment options
- Hybrid architectures
- Specific compliance needs
- Custom deployment models
Still have questions?
Additional Resources:
About Mitigant
Mitigant is a German cybersecurity company pioneering cloud security validation through attack emulation and Security Chaos Engineering. Founded by researchers from Hasso Plattner Institute with over 20 years of combined cloud security experience, Mitigant provides an integrated security platform combining CSPM, KSPM, and Cloud Attack Emulation.
The platform enables organizations of all sizes to proactively verify the readiness and resilience of their cloud-native infrastructures across AWS, Azure, and Kubernetes against potential cyber threats. By combining continuous posture management with attack validation based on MITRE ATT&CK and ATLAS frameworks, Mitigant helps detect and remediate security blind spots within cloud security strategies, tools, and teams.
Contact Information
- Website: https://www.mitigant.io
- Email: contact@mitigant.io
- Sign Up: https://www.mitigant.io/en/sign-up
Partnerships & Recognition
- Strategic partner with German Federal Office for Information Security (BSI)
- Selected for Google for Startups Growth Academy: AI for Cybersecurity
- Member of Digital Hub Bonn
- Strategic partnerships with GlobalDots, Future Spirits, Syself, and Fogbyte
Last Updated: November 2025




