Cloud Reconnaissance ==(Work In Progress)== Attack Vectors Misconfiguration Improper IAM — least privilege usage Regulation changes Outdated software Shadow IT