IAM privilege escalation - Storage access testing - Service-specific exploitation - Cross-service attack chains