Cloud Reconnaissance ==(Work In Progress)==

Attack Vectors

  • Misconfiguration
  • Improper IAM — least privilege usage
  • Regulation changes
  • Outdated software
  • Shadow IT