Attackers may move from a compromised container to the cloud environment. (See “Access cloud resources” for details).
For an example, please refer to “Access cloud resources”.