With more companies rapidly leveraging cloud providers for services, how do we more effectively exploit and expand access within these cloud-based environments? This session will help you hit the ground running with your next security assessment by demonstrating common weakness and misconfigurations I have seen in real world AWS and Azure implementations. This includes leveraging undocumented features to expand access, pivoting from the compute layer to cloud management interfaces, and manipulating logging to cover your tracks. Cloud: it's a privilege, not a right.