Back to list

Insecure default configurations enabling privilege escalation

9/10 Critical

Deploying containers with insecure settings (root user, 'latest' image tags, disabled security contexts, overly broad RBAC roles) persists because Kubernetes doesn't enforce strict security defaults. This exposes clusters to container escape, privilege escalation, and unauthorized production changes.

Category
security
Workaround
partial
Stage
deploy
Freshness
persistent
Scope
framework
Recurring
Yes
Buyer Type
team

Sources

Collection History

Query: “What are the most common pain points with Kubernetes in 2025?3/27/2026

Deploying workloads with insecure configurations, such as running containers as the root user, using the 'latest' image tag, disabling security contexts, or assigning overly broad RBAC roles... clusters can remain exposed to risks like container escape, unauthorized privilege escalation.

Created: 3/27/2026Updated: 3/27/2026