Critical Infrastructure Cybersecurity Framework
T1611Priv Esc2 Mitigations

Escape to Host

Adversaries may break out of a container to gain access to the underlying host.

Description

Adversaries may break out of a container to gain access to the underlying host.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Application Isolation and SandboxingPrivileged Account Management

Quick Info

Technique ID
T1611
Tactic
Priv Esc
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.