The Visibility Gap: What CSPM Tools Miss in Cloud Environments

Cloud computing has dramatically changed the way organizations operate, delivering unprecedented agility, scalability, and efficiency. Businesses can now deploy infrastructure and services globally within minutes. However, this transformation has not come without consequences. As organizations shift from traditional on-premise environments to complex multi-cloud architectures, the very foundation of cybersecurity is being challenged. What was once a centralized, perimeter-based approach has now evolved into a distributed, decentralized model with countless points of potential failure.

The global move to remote work further accelerated this shift. Companies needed to ensure continuous service delivery under new constraints, which pushed more workloads into the cloud. This sudden change opened the floodgates to new security vulnerabilities. Unlike traditional infrastructure, cloud environments are inherently dynamic. Resources are spun up and down frequently, often by developers rather than IT administrators. This fluid nature complicates visibility and control, leading to misconfigurations and oversights that attackers are quick to exploit.

The Human Factor in Cloud Failures

While cloud service providers offer powerful security features, they operate under a shared responsibility model. This means that while the provider secures the infrastructure, customers are responsible for securing their own data, configurations, and access controls. This distribution of responsibility can often lead to confusion or gaps in enforcement. Security teams are no longer the sole gatekeepers. Developers and DevOps engineers now play a major role in security outcomes, whether they are aware of it or not.

The skills required to secure cloud environments are also evolving. Teams must understand the nuances of cloud-native architectures, API configurations, container security, and identity access management across multiple platforms. Expecting every team to master these domains is often unrealistic. When development speed takes priority over security, critical steps such as properly configuring access control lists or applying least-privilege principles are overlooked.

A widely cited industry prediction further emphasizes this reality. It states that nearly all cloud security failures will result from customer misconfiguration or errors, not from weaknesses in the underlying cloud infrastructure. This projection highlights the pressing need for improved education, accountability, and tooling that bridges the gap between developers and security teams.

The Rise of Cloud Security Posture Management

To help organizations cope with the increasing complexity of cloud environments, a new category of tools has emerged: cloud security posture management. These tools aim to replicate the visibility and control organizations were accustomed to in traditional on-premise systems. CSPM solutions monitor cloud configurations, identify misconfigurations, enforce compliance standards, and generate alerts to guide remediation efforts.

At their core, CSPM platforms perform automated assessments of an organization’s cloud assets. They provide inventory reports, scan for policy violations, and highlight potential security gaps. This helps organizations ensure they are adhering to security best practices across a sprawling cloud ecosystem. These tools are especially useful in regulated industries where maintaining compliance across multiple cloud accounts and regions is a major challenge.

Despite their advantages, current CSPM tools have notable limitations. They often provide a surface-level view of the environment, focusing primarily on static configuration checks. They may identify that a storage bucket is publicly accessible or that an IAM role has broad permissions, but they rarely provide deeper insight into how these issues manifest within the context of the entire environment. As a result, security teams are left with fragmented data and incomplete visibility into the actual risks they face.

The Critical Role of Visibility in Cloud Security

Visibility is the foundation upon which any effective security strategy must be built. In cloud environments, this visibility must extend far beyond simple resource inventories or access control audits. Security teams need to understand how all components of the environment interact with one another, how data flows across services, and where unintended exposure may occur. Without this clarity, even the most sophisticated CSPM tool can fail to identify critical vulnerabilities.

Modern cloud environments are constantly changing. A developer may spin up a new environment for testing purposes using only a credit card and a few lines of code. These resources can remain active, untracked, and unsecured for weeks or even months. This reality is compounded when organizations adopt a multi-cloud strategy, introducing varying architectures, management interfaces, and security policies. The result is a fragmented view of infrastructure, often riddled with blind spots.

Security teams frequently struggle to understand the full scope of what exists in the cloud. Static reports and tabular dashboards may list thousands of assets but fail to communicate how they relate to one another. This makes it nearly impossible to determine whether a resource is truly exposed or if it’s part of a secure, segmented network. In environments where misconfigurations can open doors to sensitive data, these gaps in visibility pose a significant threat.

A more effective approach to visibility involves creating a dynamic, real-time map of cloud infrastructure. This model must account not only for what exists but how those assets are connected, how data moves between them, and what controls are in place to mitigate access. When security teams can visualize these relationships, they are better equipped to identify high-risk paths, prioritize vulnerabilities, and take meaningful action to reduce the attack surface.

The Illusion of Control with CSPM Tools

Cloud Security Posture Management (CSPM) tools were designed to address the critical gap in cloud visibility and control. By continuously monitoring cloud environments for misconfigurations, policy violations, and compliance gaps, CSPM platforms provide security teams with much-needed awareness across sprawling infrastructure. However, in practice, many organizations discover that CSPM solutions create only a limited illusion of control.

Most CSPM platforms rely on predefined rulesets and integrations with cloud provider APIs to gather information. These APIs provide metadata about cloud resources such as storage buckets, virtual machines, identity roles, and network configurations. While this approach enables basic inventory management and static security analysis, it often lacks the depth required to uncover meaningful, actionable risk.

For example, a CSPM tool might report that a certain S3 bucket is publicly accessible or that a firewall rule allows inbound traffic on an open port. However, it does not tell the full story. Is that S3 bucket storing sensitive customer data or just test files? Is the open port accessible from the public internet, or is it behind a private network gateway with additional layers of protection? These critical contextual details are often omitted or misunderstood.

The consequence of this lack of depth is a barrage of alerts that may not reflect actual exposure. Security teams may find themselves overwhelmed by a flood of notifications that require manual triage. In many cases, these alerts turn out to be false positives or low-priority findings, consuming time and resources that could be better spent addressing true risks.

The Complexity of Multi-Cloud Environments

As organizations embrace hybrid and multi-cloud strategies, the limitations of conventional CSPM tools become more apparent. Each cloud provider has its own service naming conventions, access control mechanisms, and networking architectures. What constitutes a public-facing resource in AWS may be entirely different in Azure or Google Cloud. Yet many CSPM tools apply generic rulesets across all platforms, missing provider-specific nuances that can dramatically alter the risk landscape.

This complexity is further compounded by the growing adoption of infrastructure-as-code (IaC), which allows developers to provision cloud resources using scripts and templates. While IaC accelerates deployment and promotes consistency, it also creates situations where security issues can be rapidly propagated across environments. Misconfigured templates, insecure defaults, or overly permissive roles can scale across dozens or hundreds of cloud accounts before being noticed.

CSPM tools are often reactive in these environments. They scan the deployed infrastructure and report violations after the fact. This approach does not align with the speed of cloud-native development, where issues should be detected and resolved during the design or build phases. Security must shift left into the development lifecycle, but traditional CSPM platforms are not always equipped to operate in this space.

Additionally, CSPM tools often struggle with integrating data from disparate sources. They may collect configuration details from cloud accounts, but fail to correlate those findings with telemetry from firewalls, identity providers, or workload monitoring solutions. Without this integration, the broader security picture remains incomplete, and key indicators of risk go unnoticed.

Visibility Gaps in Access and Connectivity

Perhaps the most critical shortcoming of many CSPM platforms lies in their inability to accurately assess end-to-end access and connectivity. Security risks are rarely confined to a single resource. They typically emerge from complex interactions between services, users, and networks. A misconfigured access role may not pose a threat on its own, but when combined with an exposed service and a permissive network rule, it can open a path to sensitive data.

CSPM tools that rely solely on metadata and static configuration data often miss these access pathways. They may report that a subnet is marked as “public,” but fail to recognize that traffic is restricted by a third-party firewall or an advanced security group. Conversely, they may miss exposures that arise from chained misconfigurations across multiple services or accounts.

Understanding true exposure requires the ability to trace how a user or service could navigate through the network, across services, and into data repositories. This is not just a matter of static visibility—it requires dynamic analysis of policies, routes, access controls, and runtime behaviors. Without this depth of visibility, organizations remain vulnerable to indirect or “lateral” attack paths that evade traditional detection.

This becomes particularly important in scenarios involving container orchestration or serverless functions. In these architectures, ephemeral workloads are created and destroyed rapidly, often interacting with numerous APIs, databases, and queues. CSPM tools that are not aware of these interactions in real time cannot provide an accurate risk assessment.

Moreover, many CSPM platforms do not account for layered security controls. For instance, if an engineer deploys a well-known third-party firewall in front of a cloud workload, the CSPM platform may flag the resource as vulnerable because it sees the workload’s native configuration in isolation. Without the ability to understand how traffic is filtered and which security appliances are in place, the analysis lacks accuracy and generates false alerts.

The Operational Cost of Incomplete Intelligence

The downstream effects of incomplete visibility can be felt throughout the organization. Security teams spend significant time chasing alerts that are either benign or irrelevant. Incident response becomes reactive and time-consuming, as analysts must manually trace access paths and dependencies using scattered tools and logs. This not only delays resolution but also increases the likelihood of oversight during a critical security event.

Security operations centers (SOCs) face alert fatigue—a situation where the sheer volume of alerts results in desensitization and missed threats. Analysts may begin to ignore alerts altogether or deprioritize findings that appear similar to past false positives. In an environment where every second counts, this loss of focus can have serious consequences.

Incomplete visibility also impacts governance and compliance efforts. Regulators expect organizations to demonstrate clear control over their infrastructure, including evidence of access restrictions, data protection mechanisms, and incident response procedures. CSPM platforms that cannot provide comprehensive visibility and traceability limit an organization’s ability to pass audits or respond to data breach investigations.

Further, executive stakeholders rely on risk assessments and metrics to make informed decisions. If the data coming from security tools is inaccurate or lacking context, leadership may underestimate the severity of risks or invest in the wrong areas. This misalignment can derail security strategies and result in wasted resources.

Moving Beyond Traditional CSPM

The limitations of current CSPM solutions have sparked a broader discussion around the future of cloud security tooling. To remain effective, these platforms must evolve to provide more than just configuration checks. They must become engines of continuous, contextualized visibility that reflect the reality of how cloud environments operate.

This evolution requires an emphasis on dynamic modeling. Instead of simply listing resources and flagging violations, tools should build real-time maps of cloud infrastructure. These maps must represent the actual flow of data, the chain of trust between identities and services, and the security controls that enforce boundaries. Only then can security teams understand where vulnerabilities lie and how they can be exploited.

Additionally, CSPM solutions must become more integrated. They should not operate in isolation but rather combine data from identity providers, workload monitoring platforms, network traffic analysis tools, and threat intelligence feeds. This fusion of insights enables more accurate detection, better prioritization, and faster response.

Another key advancement is the inclusion of contextual prioritization. Not every misconfiguration warrants immediate action. Security tools must weigh factors such as the sensitivity of the asset, the exposure level, and the likelihood of exploitation. This approach allows teams to focus on the risks that truly matter, rather than being buried in low-impact findings.

Ultimately, cloud security cannot rely on traditional methods adapted to modern infrastructure. It requires purpose-built platforms that embrace the fluidity, complexity, and distributed nature of the cloud. These platforms must empower both security professionals and developers to understand, secure, and maintain resilient environments—without slowing innovation.

The Growing Need for End-to-End Access Understanding

As cloud environments scale in complexity, understanding access is no longer a matter of checking who has permissions to what. It’s about understanding the how. How do users, applications, services, or attackers traverse from one system to another? What are the actual paths—both intended and unintended—that data or commands can take through the infrastructure? This is what end-to-end access visibility aims to solve.

Most current security tools, including many CSPM solutions, operate with a narrow lens. They evaluate permissions, configurations, and network rules in isolation, reporting on potential misconfigurations or risky settings. However, this fragmented view often leads to incorrect conclusions about whether a resource is actually exposed or secured.

Consider a resource hosted in a subnet marked as “public” within a cloud provider’s configuration. A CSPM tool may flag it as high risk based on that setting alone. However, if that resource is actually protected behind multiple layers of access control—such as a private API gateway, a firewall with strict rules, or a custom Kubernetes network policy—it may not be exposed at all. On the other hand, a resource assumed to be private might be reachable via a series of interconnected roles, open service accounts, or misconfigured VPC peering routes that the CSPM tool doesn’t detect. These are the kinds of access paths that attackers exploit—and the ones traditional tools fail to uncover.

End-to-end access understanding is not simply about permissions. It’s about how identities, traffic, and policies interact dynamically over time. Only with this level of analysis can security teams map out how data might move through the cloud ecosystem, uncover unintended access patterns, and prevent data exfiltration before it happens.

The Complexity of Modern Access Paths

In modern cloud-native environments, access is determined by a blend of network policies, IAM configurations, role assumptions, third-party integrations, runtime containers, and ephemeral services. The interaction between these layers can create complex and often invisible access paths.

A simple application might involve multiple microservices running in containers, communicating over internal APIs, authenticating via temporary tokens, and accessing shared data stores through identity federation. Each of these components introduces a point of access and a potential risk if misconfigured or misused.

Add to this the reality of multi-cloud and hybrid deployments, and the complexity becomes even greater. A service in AWS may need to interact with a database in Azure, using a cloud-agnostic API or federated access. The tools managing these interactions must be able to follow that trail across provider boundaries, understand the policy enforcement points at each step, and identify where security controls succeed or fail.

Traditional CSPM tools are not equipped to analyze these interactions holistically. They tend to break down when attempting to trace a complete path from user to data, from edge to database, or from function to storage. Without a full understanding of how access is actually implemented and enforced across these services, teams are left to make assumptions—assumptions that can have costly consequences.

Attackers, however, do not operate with such limitations. They look for any viable path—no matter how indirect—that leads to sensitive data. These paths may involve credential reuse, API misconfigurations, exposed IAM roles, or unintended service trust relationships. Without end-to-end access analysis, organizations remain blind to these opportunities, and attackers gain the upper hand.

False Positives and the Cost of Incomplete Context

A significant consequence of failing to understand access holistically is the high volume of false positives generated by security tools. When a tool flags a resource as exposed based on a single misconfiguration—without accounting for the presence of compensating controls—it may prompt security teams to treat the issue as urgent. In reality, however, the resource may not be accessible in any practical sense.

Over time, this constant flood of high-severity alerts with little actionable context erodes trust in security tooling. Analysts begin to doubt the accuracy of alerts, delay response actions, or deprioritize truly critical findings because they appear identical to previous non-issues. This phenomenon, often referred to as alert fatigue, weakens a team’s ability to respond quickly and appropriately when a real threat arises.

Conversely, false negatives are equally dangerous. A resource may appear to be properly secured because no individual component shows a misconfiguration. However, when the full access path is considered—including chained permissions, third-party integrations, and runtime behavior—the resource may in fact be highly exposed. This kind of latent vulnerability is the most difficult to detect and the most dangerous when exploited.

Organizations need security tools that don’t just surface alerts but provide clarity and accuracy. This requires a deep understanding of how access actually works—not in theory, but in practice. That means tracing paths through identity assumptions, routing tables, cross-account roles, and inter-service communication. It means detecting when a change in one part of the infrastructure inadvertently creates new access elsewhere.

The cost of overlooking such issues is high. Misconfigured access has led to some of the most serious cloud breaches in recent years. In many of these cases, the misconfiguration itself was minor or seemingly inconsequential—an over-permissive role, an unmonitored API, a forgotten test environment. But when combined with other overlooked details, the result was catastrophic exposure.

Visualizing Access to Understand Risk

To manage cloud risk effectively, security teams must move beyond textual or tabular representations of access. Spreadsheets and static dashboards cannot communicate the complexity of real-time access and interconnectivity between services. Instead, organizations need dynamic, visual representations of access paths that can be explored, queried, and understood by both technical and non-technical stakeholders.

Visual access maps reveal the hidden relationships and dependencies within cloud environments. They allow teams to trace how a specific identity can reach a critical resource, identify which security controls are enforced at each step, and determine whether any redundant or unnecessary access exists. These maps also help identify the blast radius of a compromised identity or misconfigured service, providing invaluable insights for incident response and risk modeling.

In practice, such visualizations must be continuously updated to reflect the ever-changing nature of cloud environments. Resources are added, policies are modified, and services are re-architected frequently. A visualization that is accurate today may be outdated tomorrow. Therefore, real-time or near-real-time updates are critical to maintaining situational awareness and minimizing risk.

These models also serve as a communication bridge between teams. Developers can use them to understand how security policies affect application behavior. Security teams can use them to explain risks to stakeholders and prioritize remediations. Auditors can use them to verify compliance and track data flow through the infrastructure.

By embracing visual, end-to-end access analysis, organizations shift from reactive security management to proactive risk reduction. They gain the ability to predict how a change in one part of the system may impact security elsewhere. This leads to better decisions, faster incident response, and more resilient architectures.

Bridging the Gap Between CSPM and True Risk Awareness

Current CSPM tools may offer value in scanning for misconfigurations, enforcing baseline policies, and managing compliance checklists. However, without deep and dynamic access analysis, their ability to detect real risk is inherently limited. Misconfigurations matter—but only when they result in meaningful exposure. Without contextual awareness, CSPM findings are reduced to a long list of disconnected issues with no prioritization or actionable insight.

To bridge this gap, organizations must evolve beyond checklist security. They must develop a comprehensive understanding of their cloud infrastructure, one that includes the relationships between users, services, networks, and data. This requires investing in tools and platforms that prioritize visibility, context, and accurate access path analysis.

In doing so, security teams gain more than just better alerts—they gain confidence. Confidence that their most sensitive assets are protected. Confidence that alerts are meaningful and urgent. Confidence that changes in infrastructure won’t unknowingly introduce new vulnerabilities.

Ultimately, the goal is not just to identify weaknesses but to understand them in the context of how attackers think and move. This is what allows organizations to stay ahead—not simply react to problems after they’ve been exploited.

Prioritizing What Matters: The Exposure-First Approach

As cloud environments continue to expand in complexity and scale, the traditional security model—focused on reacting to misconfigurations or enforcing compliance—struggles to keep up. Simply collecting findings and responding to alerts as they appear is no longer an effective strategy. Organizations need a more focused, strategic approach to managing cloud risk. This is where the concept of exposure-first security comes into play.

An exposure-first strategy begins with a simple but powerful premise: not all risks are equal. While a CSPM tool might surface hundreds of findings in a given week, only a handful of them may actually represent meaningful exposure to sensitive data or critical infrastructure. The rest may be low-priority issues, theoretical in nature, or already mitigated by compensating controls. Treating all issues as equal creates noise and wastes resources. Focusing first on actual exposure enables organizations to address the most urgent and impactful threats first.

Exposure-first thinking shifts attention to the outcome—whether a resource, identity, or service is reachable by an unauthorized user or from an untrusted network. It involves tracing the full chain of potential access, understanding what protections are in place, and evaluating whether the resource is truly vulnerable. Rather than looking at individual policy violations in isolation, this approach considers the real-world consequences of those misconfigurations in context.

This strategy does not discard compliance or posture management—it enhances them. By prioritizing the issues that introduce real exposure, teams can align their remediation efforts with actual risk. This not only improves security outcomes but also builds credibility across the organization, especially with business and leadership stakeholders who expect security investments to deliver tangible results.

Risk-Based Prioritization in a Noisy Environment

One of the biggest challenges in cloud security is separating signal from noise. Every misconfigured bucket, unused IAM role, or excessive permission is technically a deviation from best practice. But in environments with thousands of accounts, services, and users, addressing each one individually is unrealistic.

Risk-based prioritization is the answer to this problem. It involves ranking findings based on their potential impact, likelihood of exploitation, and proximity to critical assets. A storage bucket with public access may be low risk if it contains non-sensitive test data and resides in a locked-down environment. Conversely, an internal role with access to customer databases—combined with lateral movement potential from a misconfigured service—may represent a far higher risk even if no specific alert has been raised.

To enable this kind of prioritization, security teams must have access to rich contextual data. This includes information about data classification, access paths, trust relationships between services, and the presence of mitigation controls. It also requires insight into external threat intelligence—what vulnerabilities are being exploited in the wild, what attacker behaviors are trending, and how these relate to the organization’s architecture.

When all this information is brought together, security leaders can make decisions based not just on what has gone wrong, but on what truly matters. They can confidently justify why certain risks are addressed immediately, while others are monitored over time. They can allocate resources more effectively and reduce the time to remediation for critical vulnerabilities.

This approach also helps in incident response. During a security event, knowing which systems are exposed—and how attackers could move between them—can drastically improve containment and resolution times. Rather than starting from a flat list of assets, incident responders begin with a map of exposure paths and known high-value targets, allowing them to act quickly and decisively.

Addressing Misconfiguration at Its Root

Misconfiguration remains the leading cause of cloud data breaches. Yet many organizations continue to treat it as a surface-level problem: something to be fixed after deployment using scanning tools and manual reviews. This reactive approach is insufficient and does little to reduce the root causes of risk.

A proactive cloud security strategy requires a deeper examination of how and why misconfigurations occur in the first place. Often, they are the result of unclear ownership, insufficient guardrails, or the disconnect between development speed and security oversight. When developers are empowered to spin up infrastructure with limited visibility from security teams, the likelihood of inconsistent or insecure setups increases.

To address this, organizations must embed security into the development lifecycle. This means incorporating security checks during code development, using infrastructure-as-code scanning tools, and applying policy-as-code frameworks that enforce standards at build time. It also means training developers to understand cloud security principles and giving them the tools they need to make secure decisions without slowing down innovation.

Automation plays a key role here. By integrating security into CI/CD pipelines, organizations can prevent misconfigurations from ever reaching production. Automated policies can reject deployments that don’t meet certain criteria, while approved configurations and modules can help standardize infrastructure across teams.

However, even with strong preventive controls, some misconfigurations will slip through. That’s why continuous monitoring, dynamic visibility, and end-to-end access analysis remain critical. The goal is not just to prevent every mistake but to detect and contain them quickly, with minimal impact to the business.

From Reactive to Proactive: Building a Resilient Cloud Security Program

The ultimate goal of any cloud security strategy is resilience—the ability to withstand attacks, adapt to change, and recover quickly from incidents. To achieve this, organizations must move beyond reactive models and adopt a proactive, risk-informed approach that prioritizes exposure, enables intelligent decision-making, and supports ongoing visibility.

Proactive cloud security means anticipating how attackers might move through your infrastructure and putting controls in place before they can exploit weaknesses. It means designing systems with security in mind from the outset, using zero-trust principles, least-privilege access, and segmentation strategies to limit lateral movement and reduce the blast radius of a breach.

It also means building a culture of shared responsibility. Security is no longer the sole domain of a dedicated team—it is a collaborative effort that spans developers, architects, operations, and business leaders. Everyone has a role to play in reducing risk, and everyone must have access to the tools and data they need to understand and manage that risk effectively.

Metrics and feedback loops are essential in this process. Organizations must track not just how many alerts are generated, but how quickly critical issues are resolved, how effectively security is integrated into workflows, and how well teams are prepared to respond to incidents. These insights help improve processes over time and ensure that security investments are delivering measurable value.

Finally, it requires the right tools. CSPM platforms must evolve beyond static analysis into dynamic platforms capable of modeling complex access paths, integrating data from across the technology stack, and supporting exposure-first strategies. They must provide visibility not just into what exists, but into how systems are used, where they are vulnerable, and how those vulnerabilities connect.

The of Cloud Security Is Contextual

The future of cloud security lies in context—not just in what assets or policies exist, but in how they relate to one another and how attackers might exploit those relationships. Security tools must understand this context to deliver value. Organizations must demand this context to manage risk effectively.

An exposure-first approach, powered by deep access visibility and intelligent prioritization, is a step toward that future. It transforms security from a checklist of tasks into a strategic capability. It allows teams to focus on what matters, respond faster, and build with confidence.

In the years ahead, the complexity of cloud environments will only increase. New technologies, services, and patterns will emerge, and the attack surface will continue to evolve. But with the right strategy—one built on visibility, context, and proactive action—organizations can stay ahead of threats and make cloud security a foundation of their success.

Final Thoughts

Securing the cloud is no longer a matter of applying traditional security practices to a new environment. It requires a fundamental rethinking of how visibility, control, and accountability are achieved in a world where infrastructure is ephemeral, identities are dynamic, and services are interconnected across providers and platforms.

Cloud Security Posture Management has become an essential component in the modern security toolkit, but CSPM alone is not enough. Without deep, contextual visibility—especially into how access truly functions—organizations risk operating with a false sense of security. Misconfigurations will continue to happen. Identities will remain complex. Infrastructure will keep changing. What determines whether these realities lead to breaches or resilience is how well an organization understands its cloud environment and acts on that understanding.

The evolution of cloud security lies in moving beyond surface-level findings and toward meaningful insights. It’s about prioritizing exposure over policy violations, understanding access over isolated permissions, and enabling teams to make informed, timely decisions that protect the business without slowing it down.

Organizations that invest in visibility, embrace automation, and foster collaboration between developers and security teams will be positioned not only to defend against modern threats but to thrive in a cloud-first world. Those that rely on static tools and outdated assumptions will fall behind.

The cloud offers unprecedented opportunity—but only for those who secure it with clarity, context, and confidence.