
You can query this if if someone has compromised the machine. They can read out what does this service account what's the permissions. So, that's one way which is very interesting that you can find on a compromised cloud machine. Another one is those key utilities that everyone is using.