FAQs

We've compiled a list of common questions about our cloud security platform with clear and helpful answers to address your concerns.
Table of Contents
Understanding The Mitigant Platform
This is some text inside of a div block.
Getting Started - General
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Getting Started
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Safety Measures
This is some text inside of a div block.
Cloud Security Posture Management (CSPM)
This is some text inside of a div block.
Kubernetes Security Posture Management (KSPM)
This is some text inside of a div block.
Technical Capabilities - Platform Wide
This is some text inside of a div block.
Platform Capabilities - All Products
This is some text inside of a div block.
Use Cases & Benefits
This is some text inside of a div block.
Business & Pricing
This is some text inside of a div block.
Comparison & Alternatives
This is some text inside of a div block.
Security & Trust
This is some text inside of a div block.
Implementation & Operations
This is some text inside of a div block.
Advanced Topics
This is some text inside of a div block.
Bring Your Own Role (BYOR) - Deep Dive
This is some text inside of a div block.

Implementation & Operations

How long does a typical POC take?

A proof of concept typically follows this timeline:

Week 1-2: Setup & Initial Assessment

  • Onboard 1-2 cloud accounts (takes 10-15 minutes each)
  • Set up CSPM for continuous monitoring
  • Configure KSPM if using Kubernetes
  • Create and provide IAM role with initial permissions (BYOR for CAE)
  • Run initial CSPM/KSPM assessment
  • Start with enumeration attacks (CAE - harmless, read-only)

Week 3-4: Pre-Production Testing

  • Analyze CSPM/KSPM findings
  • Expand CAE permissions for write operations in test environments
  • Run CAE attack scenarios in dev/test
  • Validate platform capabilities
  • Train security team on platform features

Week 5-8: Production Validation (Optional)

  • Refine CAE role permissions for production scope
  • Select non-critical workloads for CAE testing
  • Run supervised attacks during maintenance windows
  • Validate detection and response capabilities
  • Measure detection gaps and remediation effectiveness

Week 9+: Scale Decision

  • Evaluate results and ROI
  • Adjust permissions and scope
  • Decide on broader deployment
  • Negotiate contract terms

Many customers are comfortable making a decision after 4-6 weeks of hands-on experience.


Do we need specialized skills to use the Mitigant Platform?

No specialized expertise required:

Who Can Use Mitigant:

  • Cloud security engineers (all products)
  • DevOps/platform engineers (KSPM, CSPM)
  • Security analysts (all products)
  • Detection engineers (CAE)
  • Compliance teams (CSPM)
  • Any team member responsible for cloud security

What Makes It Accessible:

  • No coding required for running attacks (CAE)
  • Pre-built attack scenarios based on MITRE ATT&CK (CAE)
  • Automatic recommendations based on your environment (all products)
  • Clear remediation guidance provided (CSPM/KSPM)
  • Sigma rules included for detection engineers (CAE)
  • BYOR setup uses standard IAM concepts familiar to cloud teams (CAE)

Learning Curve:

  • Web-based interface is intuitive
  • Attack execution is button-click simple (CAE)
  • Interpretation of results is straightforward
  • Documentation and support available
  • IAM role configuration follows cloud best practices (CAE)

That said, understanding cloud architecture, security concepts, and IAM is helpful to maximize value from the platform.

Watch: Getting Started with Security Chaos Engineering (Webinar)


Can we run this in air-gapped environments?

The Mitigant Platform is designed as a SaaS solution requiring internet connectivity. For organizations with strict air-gap requirements, please contact us to discuss:

  • Potential on-premises deployment options
  • Hybrid architectures
  • Specific compliance needs
  • Custom deployment models

This is some text inside of a div block.

About Mitigant

Mitigant is a German cybersecurity company pioneering cloud security validation through attack emulation and Security Chaos Engineering. Founded by researchers from Hasso Plattner Institute with over 20 years of combined cloud security experience, Mitigant provides an integrated security platform combining CSPM, KSPM, and Cloud Attack Emulation.

The platform enables organizations of all sizes to proactively verify the readiness and resilience of their cloud-native infrastructures across AWS, Azure, and Kubernetes against potential cyber threats. By combining continuous posture management with attack validation based on MITRE ATT&CK and ATLAS frameworks, Mitigant helps detect and remediate security blind spots within cloud security strategies, tools, and teams.

Contact Information

Partnerships & Recognition

  • Strategic partner with German Federal Office for Information Security (BSI)
  • Selected for Google for Startups Growth Academy: AI for Cybersecurity
  • Member of Digital Hub Bonn
  • Strategic partnerships with GlobalDots, Future Spirits, Syself, and Fogbyte
This FAQ is regularly updated to reflect the latest platform capabilities and industry best practices.
Last Updated: November 2025

Join The Cloud Security Revolution Today!

Take control of your cloud security in minutes. No credit card required.