1. 2022 (accessed Jan 21 2022). Amazon IAM Policy Grammar. https://docs.aws. amazon.com/IAM/latest/UserGuide/reference_policies_grammar.html 2022 (accessed Jan 21 2022). Amazon IAM Policy Grammar. https://docs.aws. amazon.com/IAM/latest/UserGuide/reference_policies_grammar.html
2. 2022 (accessed Jan 21 2022). CyberArk: Hunting Azure Blobs Exposes Millions of Sensitive Files. https://www.cyberark.com/resources/threat-research-blog/ hunting-azure-blobs-exposes-millions-of-sensitive-files 2022 (accessed Jan 21 2022). CyberArk: Hunting Azure Blobs Exposes Millions of Sensitive Files. https://www.cyberark.com/resources/threat-research-blog/ hunting-azure-blobs-exposes-millions-of-sensitive-files
3. Semantic-based Automated Reasoning for AWS Access Policies using SMT