Cloud initial access playbooks¶
Full attack chains from first contact to established access. Where the runbooks cover individual techniques in depth, the playbooks show how those techniques connect into an operational sequence.
Each playbook assumes a scoped engagement with written authorisation.