This part explores the use of service and dormant accounts by cyber actors to gain access to cloud environments, highlighting the risks associated with these types of accounts.