Methods for detection and analysis of misconfiguration-based attacks in cloud services. (2025). Information Systems and Technologies Security, 1(9), 26-31. https://doi.org/10.17721/ISTS.2025.9.26-31