AWS, Azure, GCP, and Kubernetes security validation — offensive techniques and cloud-native attack path analysis.