In recent years, Cloud Security Posture Management (CSPM) tools have become increasingly popular, and with good reason. The posture management capabilities a CSPM provides can help an organization better understand cloud configuration to prevent potential security incidents. The basic idea is that a CSPM will monitor how secure your cloud environment is, so breaches won't happen.

Enterprises just starting out with a CSPM or Cloud Native Application Protection Platform (CNAPP) may be looking to this tool as a silver bullet for anything cloud security related. However, despite organizations having CSPM or CNAPP technologies, attacks and cloud and SaaS security breaches still happen. It's a situation that is somewhat reminiscent of the earliest era of internet security, when everyone had antivirus technology, but systems still got malware and got breached. No preventative system, no matter how robust, can fully eliminate cloud breaches.  

CSPM Strengths and Limitations

CSPM platforms are designed to highlight problems, errors, and security risks related to an enterprise’s current cloud configurations or workloads. They sound the alarm on misconfigurations through alerts and remediate the insecure configurations that they find. These are vital capabilities for companies using the cloud. However, they’re not the only cloud security capabilities modern enterprises require. That’s because when something happens, a CSPM can't investigate the whole cloud attack lifecycle or help you determine the blast radius.

Imagine you have a house, with different doors and windows. A CSPM can tell you the material the doors and windows are made of, what condition they’re in, and point out areas that need to be repaired. It can tell you if a faulty lock has left a window open. A CSPM can’t tell you if anyone entered that window—or piece together what happened once they were inside.

In today’s escalating cloud threat landscape, it’s not enough to fix the “faulty lock.” You have to be able to fully investigate the threat and quickly get answers. Did an incident take place?  If so, how did the attacker get in? Where did they go while they were inside? And what did they take?


Bridging the Gap with Context-Informed Threat Analysis

Where CSPMs leave off (at check-the-box cloud detection and response), new solutions are needed that empower teams with deep cloud investigation capabilities. And they need to do so without requiring deep cloud IR knowledge. Mitiga's solution steps in where the capabilities of CSPM and CNAPP technologies of the world stop.

So, let’s go back to our house metaphor: When a break-in happens, CSPM and CNAPP solutions aren’t able to investigate. With Mitiga, if your “house” is broken into, we can quickly tell you that the attacker entered through a crack in the window, that they took keys from the nightstand, ate all the food in your refrigerator, took your car and drove off.

That's the sort of clarity and context organizations operating in the cloud need. It's simply not enough to only know the state of cloud posture.

Mitiga addresses the gap left by CSPM and CNAPP tools by proactively and continually gathering, retaining and analyzing all the cloud application log data required for investigation to provide critical context, including the full scope of compromise.

But what if the attacker is already inside your house, hiding in the basement or the attic, waiting for the right moment to strike? How would you know if they are there, and what they are planning to do? This is where threat hunting comes in. Threat hunting is the proactive search for signs of malicious activity within your cloud environment, before they cause damage or data loss.

By using advanced techniques such as anomaly detection, behavioral analysis, and threat intelligence, Mitiga helps identify and eliminate any threats that have evaded your security controls and gone unnoticed. By empowering teams with knowledge of the tactics, techniques and procedures used by attackers, this context-informed threat analysis enables and dramatically accelerates incident response, lowering breach impact.

Users of CSPM tools understand well the importance of finding and fixing vulnerabilities. Now it’s time for enterprises to close the gap in their cloud investigation capabilities. Mitiga can help.

LAST UPDATED:

May 14, 2025

Supercharge your SOC's cloud capabilities. Download the whitepaper.

Don't miss these stories:

Why Wi-Fi Isn’t Enough: Joseph Salazar on Wireless Airspace Security

In this episode of Mitiga Mic, we sit down with cybersecurity veteran Joseph Salazar, now with Bastille Networks, to uncover the vast and often invisible world of wireless attack surfaces. From Bluetooth-enabled coffee mugs and smart thermostats to malicious USB cables that launch attacks from parking lots, Joseph walks us through real-world threats that operate outside your firewall and beyond traditional security tools.

From Breach Response to Platform Powerhouse: Ofer Maor on Building Mitiga for Cloud, SaaS, and Identity Security

Solutions Platform Helios AI Cloud Security Data Lake Cloud Threat Detection Investigation and Response Readiness (TDIR) Cloud Detection and Response (CDR) Cloud Investigation and Response Automation (CIRA) Investigation Workbench Managed Services Managed Cloud Detection and Response (C-MDR) Cloud Managed Threat Hunting Cloud and SaaS Incident Response Resources Blog Mitiga Labs Resource Library Incident Response Glossary Company About Us Team Careers Contact Us In the News Home » Blog Main BLOG From Breach Response to Platform Powerhouse: Ofer Maor on Building Mitiga for Cloud, SaaS, and Identity Security In this premiere episode of Mitiga Mic, Mitiga’s Co-founder and CTO Ofer Maor joins host Brian Contos to share the journey behind Mitiga’s creation—and how it became the first purpose-built platform for cloud, SaaS, and identity detection and response. Ofer discusses why traditional incident response falls short in modern environments, how Mitiga built its platform from real-world service experience, and the crucial role of automation and AI in modern SOC operations.

Helios AI: Why Cloud Security Needs Intelligent Automation Now

Mitiga launches Helios AI, an intelligent cloud security solution that automates threat detection and response. Its first feature, AI Insights, cuts through noise, speeds up analysis, and boosts SecOps efficiency.

Hackers in Aisle 5: What DragonForce Taught Us About Zero Trust

In a chilling reminder that humans remain the weakest component in cybersecurity, multiple UK retailers have fallen victim to a sophisticated orchestrated cyber-attack by the hacking group known as DragonForce. But this breach was not successful using a zero-day application vulnerability or a complex attack chain. It was built on trust, manipulation, and a cleverly deceptive phone call.

No One Mourns the Wicked: Your Guide to a Successful Salesforce Threat Hunt

Salesforce is a cloud-based platform widely used by organizations to manage customer relationships, sales pipelines, and core business processes.

Tag Your Way In: New Privilege Escalation Technique in GCP

GCP offers fine-grained access control using Identity and access management (IAM) Conditions, allowing organizations to restrict permissions based on context like request time, resource type and resource tags.