Container Security: Escaping Docker and Attacking Kubernetes
Containers offer process isolation, not security boundaries. Privileged containers, exposed Docker sockets, misconfigured Kubernetes RBAC, and accessible cloud metadata endpoints all create paths from a compromised container to full cluster or host compromise. Understanding these vectors is essential for assessing environments that rely on containerization as part of their security model.