FAQs

We've compiled a list of common questions about our cloud security platform with clear and helpful answers to address your concerns.
Table of Contents
Understanding The Mitigant Platform
This is some text inside of a div block.
Getting Started - General
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Getting Started
This is some text inside of a div block.
Cloud Attack Emulation (CAE) - Safety Measures
This is some text inside of a div block.
Cloud Security Posture Management (CSPM)
This is some text inside of a div block.
Kubernetes Security Posture Management (KSPM)
This is some text inside of a div block.
Technical Capabilities - Platform Wide
This is some text inside of a div block.
Platform Capabilities - All Products
This is some text inside of a div block.
Use Cases & Benefits
This is some text inside of a div block.
Business & Pricing
This is some text inside of a div block.
Comparison & Alternatives
This is some text inside of a div block.
Security & Trust
This is some text inside of a div block.
Implementation & Operations
This is some text inside of a div block.
Advanced Topics
This is some text inside of a div block.
Bring Your Own Role (BYOR) - Deep Dive
This is some text inside of a div block.

Use Cases & Benefits

What are the key use cases for the Mitigant Platform?

The Mitigant Platform addresses seven critical use cases across cloud security operations:

1. AI Red Teaming (CAE + CSPM)

Purpose-built for testing AI workloads in the cloud

The Challenge:

  • Organizations adopting GenAI/AI workloads lack security validation capabilities
  • New attack vectors targeting AI/ML systems (LLMJacking, prompt injection, data poisoning)
  • Traditional security tools don't cover AI-specific threats mapped to MITRE ATLAS

How Mitigant Helps:

  • Specialized GenAI security validation with attacks mapped to MITRE ATLAS framework
  • Emulates AI-specific attacks like LLMJacking against Amazon Bedrock
  • Tests security of RAG (Retrieval-Augmented Generation) data sources
  • Validates detection and response capabilities for AI workloads without writing code
  • Monitors and detects misconfigurations in GenAI cloud resources (CSPM)

Who Benefits:

  • Organizations deploying GenAI services
  • AI/ML engineering teams
  • Data science teams using cloud AI services
  • Security teams responsible for AI infrastructure

Real-World Application:

  • Test security of Amazon Bedrock deployments against data poisoning attacks
  • Validate that LLMJacking attempts are detected by your security tools
  • Identify security blind spots in GenAI infrastructure
  • Ensure RAG S3 buckets are properly secured against ransomware

Learn more: AI Red Teaming Use Case

See platform: Cloud Attack Emulation for GenAI

2. Cloud Penetration Testing (CAE)

Streamlined cloud penetration testing—no need to wait for months!

The Challenge:

  • Traditional penetration tests take months to schedule and provide only point-in-time validation
  • Cloud environments change constantly - pen test results become outdated quickly
  • Manual pen testing doesn't scale for continuous cloud deployments
  • Expensive and requires specialized security consultants

How Mitigant Helps:

  • Continuous, automated cloud penetration testing - run tests daily, weekly, or on-demand
  • No waiting for external consultants - security engineers can run tests immediately
  • 100+ pre-built attack scenarios based on real cloud attack patterns
  • Automated, repeatable scenarios that can be re-run after remediation
  • Safe execution with automatic rollback and BYOR (Bring Your Own Role) controls
  • Cloud-native attacks that understand AWS, Azure attack vectors

Who Benefits:

  • Cloud security teams
  • DevSecOps engineers
  • Organizations with rapid cloud deployment cycles
  • Teams needing continuous validation between annual pen tests

Real-World Application:

  • Test new deployments before they reach production
  • Validate that external pen test findings have been properly remediated
  • Run weekly automated tests against cloud infrastructure
  • Maintain continuous security assurance without waiting months

Learn more: Cloud Penetration Testing Use Case

Learn more: Cloud Attack Emulation: Democratizing Security Operations

3. Detection Validation (CAE + CSPM)

Prove your defenses actually work as desired

The Challenge:

  • Security teams deploy detection tools (SIEM, CDR, EDR, CNAPP) but don't know if they actually work
  • Detection rules may have blind spots, misconfigurations, or coverage gaps
  • False sense of security from unvalidated detection capabilities
  • Can't prove ROI on security tool investments

How Mitigant Helps:

  • Validates detection effectiveness by emulating real attacks mapped to MITRE ATT&CK
  • Tests whether your SIEM/CDR/CNAPP actually triggers alerts when attacks occur
  • Provides Sigma rules to close identified detection gaps
  • Reveals which attack techniques your SOC can and cannot detect
  • Identifies false negatives before attackers exploit them
  • Proves security tools are properly configured and functioning

Who Benefits:

  • SOC teams validating detection rules
  • Detection engineers testing SIEM configurations
  • Security analysts proving tool effectiveness
  • CISOs needing to demonstrate security ROI

Real-World Application:

  • Validate Microsoft Sentinel or Splunk detection rules with real attack telemetry
  • Test whether new MITRE ATT&CK techniques are detected in your environment
  • Prove that expensive security tools are actually working
  • Continuously validate detection coverage as cloud APIs change

Learn more: Detection Validation Use Case

Learn more: Cloud Attack Emulation & Detection Engineering: A Match Made in Heaven

Learn more: Ultimate Combo: Cloud Attack Emulation meets Microsoft Sentinel

4. SOC Team Optimization (CAE + CSPM)

Give your SOC team their time back, so they focus on the more important stuff

The Challenge:

  • SOC teams overwhelmed with alert fatigue from false positives
  • Can't distinguish between theoretical vulnerabilities and real exploitable risks
  • Waste time investigating low-priority alerts
  • Struggle to prioritize remediation efforts effectively

How Mitigant Helps:

  • Reduces alert noise by validating which vulnerabilities are actually exploitable (CAE)
  • Prioritizes findings based on validated risk, not just CVSS scores
  • Automates security validation that previously required manual red team exercises
  • Provides clear, actionable remediation guidance (CSPM)
  • Eliminates false positives by proving exploitability
  • Empowers junior analysts to run sophisticated validation tests

Who Benefits:

  • Overwhelmed SOC teams
  • Security operations managers
  • Organizations with small security teams
  • Teams drowning in vulnerability backlogs

Real-World Application:

  • CSPM identifies 500 findings → CAE validates 50 are exploitable → Focus on the 50
  • Automatically validate whether CSPM findings are real threats or theoretical risks
  • Stop wasting time on vulnerabilities that can't actually be exploited in your environment
  • Free up senior analysts from repetitive validation tasks

Learn more: SOC Team Optimization Use Case

Learn more: Demystifying The Most Pervasive Cloud Attack Techniques

5. Continuous Compliance (CSPM + KSPM)

Stay audit-ready, always—no longer a point in time

The Challenge:

  • Traditional compliance assessments are point-in-time snapshots
  • Cloud environments change constantly - yesterday's compliance doesn't guarantee today's
  • Manual compliance checks are time-consuming and error-prone
  • Difficult to maintain continuous evidence for auditors

How Mitigant Helps:

  • Continuous compliance monitoring across ISO 27001, SOC 2, HIPAA, CIS Benchmarks, BSI C5, NIS2
  • Real-time detection of compliance violations and configuration drift
  • Automated evidence collection for audits
  • Clear remediation guidance with step-by-step instructions
  • Multi-cloud compliance visibility in single dashboard
  • Demonstrates proactive security validation (increasingly required by frameworks like DORA, NIS2)

Who Benefits:

  • Compliance teams
  • Cloud architects maintaining security standards
  • Organizations in regulated industries
  • Security teams preparing for audits

Real-World Application:

  • Maintain continuous SOC 2 compliance rather than scrambling before audits
  • Real-time alerts when configurations violate HIPAA requirements
  • Automated evidence collection showing continuous monitoring
  • Prove compliance across AWS and Azure from single platform

Learn more: Continuous Compliance Use Case

Learn more: Navigating the Trifecta: Balancing Cybersecurity, Compliance, and Cyber Resilience

6. Incident Readiness (CAE)

Practice makes perfect—ensure your incident response processes function effectively and not just on paper

The Challenge:

  • Incident response playbooks and runbooks are often theoretical and untested
  • Teams don't know how they'll perform during a real incident until it happens
  • Gap between documented IR procedures and actual execution under pressure
  • Difficult to practice incident response without causing real incidents

How Mitigant Helps:

  • Proactively tests incident response capabilities through realistic attack scenarios
  • Validates that IR playbooks and runbooks actually work in practice
  • Provides realistic practice environment for IR teams without business risk
  • Tests people, processes, and technology holistically
  • Generates realistic attack telemetry for forensic analysis practice
  • Enables tabletop exercises with real attack emulation instead of theoretical discussions

Who Benefits:

  • SOC teams preparing for incidents
  • Incident response teams
  • Security operations managers
  • Organizations required to demonstrate IR readiness

Real-World Application:

  • Run simulated ransomware attacks to test detection, containment, and recovery procedures
  • Practice forensic analysis with realistic attack telemetry from CAE
  • Test escalation procedures and communication workflows under realistic conditions
  • Validate that your IR team can actually execute the playbook steps
  • Conduct gameday exercises to assess organizational readiness

Learn more: Incident Readiness Use Case

Learn more: Leveraging Adversary Emulation for Effective Cloud Forensic Analysis

Watch: Getting Started with Security Chaos Engineering (Webinar)

7. Continuous Threat Exposure Management (CTEM) (All Products)

Implement Gartner's CTEM framework with validated, continuous security

The Challenge:

  • Organizations struggle to implement Gartner's CTEM framework end-to-end
  • Difficult to continuously validate which exposures are actually exploitable
  • Gap between vulnerability identification and validated risk prioritization
  • Point-in-time assessments don't work for continuously changing cloud environments

How Mitigant Helps:

  • Complete CTEM implementation across all five stages:
    1. Scoping: CSPM/KSPM provides complete asset visibility and attack surface mapping
    2. Discovery: Identifies misconfigurations, vulnerabilities, compliance gaps continuously
    3. Prioritization: CAE validates which exposures are exploitable (not just theoretical)
    4. Validation: Continuous attack emulation proves security controls actually work
    5. Mobilization: Automated remediation guidance, reporting, and team notifications

Who Benefits:

  • Security leadership implementing CTEM
  • Risk management teams
  • Organizations moving beyond traditional vulnerability management
  • CISOs needing validated exposure metrics

Real-World Application:

  • Prioritize remediation based on validated exploitability, not just CVSS scores
  • Demonstrate to leadership which risks are real vs. theoretical
  • Reduce alert fatigue by focusing only on validated exposures
  • Build metrics showing continuous improvement in security posture
  • Shift from "we have 10,000 vulnerabilities" to "we have 50 validated exposures"

Learn more: Cloud Attack Emulation 101: Shallow Waters - CTEM Integration

Learn more: What is Adversarial Exposure Validation


How do these use cases work together?

The seven use cases are interconnected and create a comprehensive security validation program:

Example Integrated Workflow:

  1. Continuous Compliance (CSPM) identifies an overly permissive S3 bucket → compliance violation
  2. Detection Validation (CAE) emulates an attack to test if your SIEM detects unauthorized access
  3. SOC Team Optimization - CAE proves it's exploitable, so SOC prioritizes it (not just another alert)
  4. Cloud Penetration Testing (CAE) - Run full attack chain to prove end-to-end exploitability
  5. Incident Readiness (CAE) - IR team practices responding to this specific scenario
  6. AI Red Teaming (CAE) - If S3 contains RAG data, test AI-specific attack vectors
  7. CTEM - Framework ties everything together with continuous validation and mobilization

The Result:

  • Move from reactive firefighting to proactive validation
  • Reduce security team burnout and alert fatigue
  • Prove ROI on security tool investments
  • Stay audit-ready continuously, not just at assessment time
  • Build confidence that your defenses actually work

This integrated approach transforms cloud security from checkbox compliance to evidence-based security validation.


How does this help with compliance and audits?

The Mitigant Platform strengthens your compliance posture:

Proactive Validation (CAE):

  • Demonstrates you're not just checking boxes—you're validating effectiveness
  • Shows auditors you test security controls continuously
  • Increasingly required by frameworks like DORA and NIS2

Continuous Compliance (CSPM/KSPM):

  • Real-time monitoring against compliance frameworks
  • Detect violations before audits
  • Clear remediation steps provided

Audit Trails (All Products):

  • Complete logging of all activities
  • Evidence of security testing and validation
  • Demonstrates due diligence in risk management

Framework Coverage (All Products):

  • Maps to multiple compliance requirements simultaneously
  • Reduces audit preparation time
  • Provides documentation auditors expect

Learn more: Navigating the Trifecta: Balancing Cybersecurity, Compliance, and Cyber Resilience


Can Mitigant CAE replace penetration testing?

Mitigant CAE complements rather than replaces traditional penetration testing:

What Mitigant CAE Provides:

  • Continuous validation: Daily/weekly instead of annual
  • Automated execution: No manual scheduling of expensive engagements
  • Instant results: Immediate feedback on security effectiveness
  • Repeatable scenarios: Run the same test after remediation
  • Affordable scale: Test continuously at fraction of pen test cost

What Traditional Pen Testing Provides:

  • Human creativity and intuition
  • Custom attack chains for your unique environment
  • Social engineering components
  • Comprehensive reporting for executives
  • Third-party validation for compliance

Best Approach: Use Mitigant CAE for continuous validation between annual pen tests. This gives you:

  • Ongoing assurance throughout the year
  • Faster detection of new issues
  • Validation that pen test findings were properly remediated
  • Evidence that new deployments don't introduce vulnerabilities

Many customers use Mitigant to make their pen tests more effective by identifying low-hanging fruit beforehand.

Learn more: Leveraging Adversary Emulation for Effective Cloud Forensic Analysis

This is some text inside of a div block.

About Mitigant

Mitigant is a German cybersecurity company pioneering cloud security validation through attack emulation and Security Chaos Engineering. Founded by researchers from Hasso Plattner Institute with over 20 years of combined cloud security experience, Mitigant provides an integrated security platform combining CSPM, KSPM, and Cloud Attack Emulation.

The platform enables organizations of all sizes to proactively verify the readiness and resilience of their cloud-native infrastructures across AWS, Azure, and Kubernetes against potential cyber threats. By combining continuous posture management with attack validation based on MITRE ATT&CK and ATLAS frameworks, Mitigant helps detect and remediate security blind spots within cloud security strategies, tools, and teams.

Contact Information

Partnerships & Recognition

  • Strategic partner with German Federal Office for Information Security (BSI)
  • Selected for Google for Startups Growth Academy: AI for Cybersecurity
  • Member of Digital Hub Bonn
  • Strategic partnerships with GlobalDots, Future Spirits, Syself, and Fogbyte
This FAQ is regularly updated to reflect the latest platform capabilities and industry best practices.
Last Updated: November 2025

Join The Cloud Security Revolution Today!

Take control of your cloud security in minutes. No credit card required.