FAQs

We've compiled a list of common questions about our cloud security platform with clear and helpful answers to address your concerns.
Table of Contents
Understanding The Mitigant Platform
This is some text inside of a div block.
Getting Started - General
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Getting Started
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Safety Measures
This is some text inside of a div block.
Cloud Security Posture Management (CSPM)
This is some text inside of a div block.
Kubernetes Security Posture Management (KSPM)
This is some text inside of a div block.
Technical Capabilities - Platform Wide
This is some text inside of a div block.
Platform Capabilities - All Products
This is some text inside of a div block.
Use Cases & Benefits
This is some text inside of a div block.
Business & Pricing
This is some text inside of a div block.
Comparison & Alternatives
This is some text inside of a div block.
Security & Trust
This is some text inside of a div block.
Implementation & Operations
This is some text inside of a div block.
Advanced Topics
This is some text inside of a div block.
Bring Your Own Role (BYOR) - Deep Dive
This is some text inside of a div block.

Security & Trust

How secure is the Mitigant Platform itself?

As a security platform, Mitigant takes its own security seriously:

Architecture:

  • SaaS platform hosted in secure cloud infrastructure
  • Agentless design minimizes attack surface
  • API-based access with least-privilege principles
  • BYOR (CAE) ensures customer-controlled security boundaries

Access Control:

  • Role-based access control for team members
  • Audit logging of all user actions
  • Integration with identity providers
  • Customers control access through their own IAM policies (CAE)

Data Handling:

  • Attack telemetry and logs stored securely
  • Compliance with data privacy regulations
  • Data residency options available

Transparency:

  • All actions logged in your CloudTrail/Azure Activity Logs
  • No hidden permissions or backdoors
  • Open documentation of required access

For detailed security architecture documentation, security questionnaires, or SOC 2 reports, please contact our team.


What about data privacy?

Mitigant's agentless approach enhances privacy:

What Mitigant Accesses:

  • Cloud resource configurations
  • IAM policies and permissions
  • Network topology
  • Service settings
  • Kubernetes cluster configurations (KSPM)
  • Only what you explicitly grant through BYOR (CAE)

What Mitigant Doesn't Access:

  • Application data within workloads
  • Customer data in databases
  • File contents in storage
  • Personal information
  • Anything outside the role permissions you define (CAE)

During CAE Attack Emulations:

  • Data exfiltration is simulated, not performed
  • No actual customer data leaves your environment
  • Attacks validate capability to access, not actual access

This is some text inside of a div block.

About Mitigant

Mitigant is a German cybersecurity company pioneering cloud security validation through attack emulation and Security Chaos Engineering. Founded by researchers from Hasso Plattner Institute with over 20 years of combined cloud security experience, Mitigant provides an integrated security platform combining CSPM, KSPM, and Cloud Attack Emulation.

The platform enables organizations of all sizes to proactively verify the readiness and resilience of their cloud-native infrastructures across AWS, Azure, and Kubernetes against potential cyber threats. By combining continuous posture management with attack validation based on MITRE ATT&CK and ATLAS frameworks, Mitigant helps detect and remediate security blind spots within cloud security strategies, tools, and teams.

Contact Information

Partnerships & Recognition

  • Strategic partner with German Federal Office for Information Security (BSI)
  • Selected for Google for Startups Growth Academy: AI for Cybersecurity
  • Member of Digital Hub Bonn
  • Strategic partnerships with GlobalDots, Future Spirits, Syself, and Fogbyte
This FAQ is regularly updated to reflect the latest platform capabilities and industry best practices.
Last Updated: November 2025

Join The Cloud Security Revolution Today!

Take control of your cloud security in minutes. No credit card required.