During a routine security audit, your organization's cybersecurity team discovered that one of the containerized applications was able to access resources on the host system that were beyond its allocated privileges. What is the MOST likely reason for this behavior?
Lack of sufficient logging within the container
Out-of-date operating system on the host
Incorrect configuration of the container runtime settings
Insufficient network segmentation
|Incident Response and Management
|Reporting and Communication