This book delves deeper into analyzing the security of various Microsoft Azure services and shows techniques and tactics used by an attacker to breach a Microsoft Azure environment. This is the sixth part of the book series “Red Team: An attack paradigm”.