Calculations

CEM uses the collected and processed data to:

  • Calculate vulnerable permissions. For more information, see Vulnerable permissions.

  • Calculate exposure. For more information, see Exposure

  • Create remediation proposals for unused permissions. For more information, see Remediation.

  • Refer to the active rules and generate findings. For more information, see Findings.