This part discusses the various methods cyber actors use to attack cloud services, highlighting the vulnerabilities and mistakes that can lead to successful breaches.