Kubernetes Security Posture Management (KSPM)
What Kubernetes environments does Mitigant KSPM support?
Mitigant KSPM works with all Kubernetes distributions:
Managed Kubernetes:
- Amazon EKS (Elastic Kubernetes Service)
- Azure AKS (Azure Kubernetes Service)
- Google GKE (Google Kubernetes Engine)
Self-Hosted Kubernetes:
- Vanilla Kubernetes clusters
- OpenShift
- Rancher
- K3s
- MicroK8s
Hybrid Environments:
- Mix of managed and self-hosted
- Multi-cluster deployments
- Edge Kubernetes installations
Architecture Support:
- Single clusters
- Multi-cluster federation
- Multiple clusters across clouds
How does Mitigant KSPM detect misconfigurations in Kubernetes?
Mitigant KSPM uses agentless monitoring of Kubernetes clusters:
What it monitors:
- Pod security configurations (privileged containers, host namespaces, etc.)
- RBAC policies and service account permissions
- Network policies and ingress/egress rules
- Secrets management and storage
- Resource limits and quotas
- Image configurations and vulnerabilities
- API server settings
- etcd security
- Node configurations
How it works:
- Connects to Kubernetes API (read-only access)
- Continuous assessment of cluster state
- Compares configurations against security best practices
- Maps findings to Kubernetes-specific benchmarks
No performance impact:
- No agents or DaemonSets to deploy
- No resource consumption on nodes
- No network overhead
- Works with existing cluster permissions
Can Mitigant KSPM prioritize vulnerabilities by exploitability?
Yes. Mitigant KSPM includes vulnerability prioritization:
How prioritization works:
- Scans container images for known CVEs
- Assesses runtime context (is the container actually running?)
- Evaluates network exposure (is it internet-facing?)
- Considers privileges (does it run as root?)
- Checks for active exploits in the wild
Prioritization factors:
- Severity: CVSS score
- Exploitability: Is there a public exploit?
- Exposure: Is the workload accessible?
- Context: What privileges does the container have?
- Validation: Can CAE prove it's exploitable?
Integration with CAE:
- KSPM finds container vulnerabilities
- CAE validates whether they're exploitable in your specific environment
- Reduces noise by focusing on validated risks
This approach dramatically reduces the vulnerability backlog by focusing on what actually matters.
How does Mitigant KSPM handle multi-cluster environments?
Mitigant KSPM provides centralized visibility across all clusters:
Multi-Cluster Features:
- Single dashboard showing all clusters
- Unified policy enforcement
- Consistent compliance monitoring
- Cross-cluster comparison and benchmarking
- Aggregated reporting
Cluster Organization:
- Group clusters by environment (dev/staging/prod)
- Tag clusters by team or business unit
- Filter by cloud provider or region
- Create custom cluster hierarchies
Use Cases:
- Monitor security posture across 10s or 100s of clusters
- Ensure consistent security policies
- Identify configuration drift between clusters
- Centralized compliance reporting
- Track security metrics across the entire K8s estate
Still have questions?
Additional Resources:
About Mitigant
Mitigant is a German cybersecurity company pioneering cloud security validation through attack emulation and Security Chaos Engineering. Founded by researchers from Hasso Plattner Institute with over 20 years of combined cloud security experience, Mitigant provides an integrated security platform combining CSPM, KSPM, and Cloud Attack Emulation.
The platform enables organizations of all sizes to proactively verify the readiness and resilience of their cloud-native infrastructures across AWS, Azure, and Kubernetes against potential cyber threats. By combining continuous posture management with attack validation based on MITRE ATT&CK and ATLAS frameworks, Mitigant helps detect and remediate security blind spots within cloud security strategies, tools, and teams.
Contact Information
- Website: https://www.mitigant.io
- Email: contact@mitigant.io
- Sign Up: https://www.mitigant.io/en/sign-up
Partnerships & Recognition
- Strategic partner with German Federal Office for Information Security (BSI)
- Selected for Google for Startups Growth Academy: AI for Cybersecurity
- Member of Digital Hub Bonn
- Strategic partnerships with GlobalDots, Future Spirits, Syself, and Fogbyte
Last Updated: November 2025




