This part provides a detailed look at the tactics, techniques, and procedures (TTPs) used by cyber actors to gain initial access to cloud environments, including brute forcing, password spraying, and token authentication.