چکيده
The integration of container technologies into modern computing environments has
transformed the way applications are deployed, managed, and scaled—especially in
the context of next-generation mobile networks such as 5G and the emerging 6G
paradigm. Containers, supported by orchestration platforms like Kubernetes, offer
unparalleled efficiency, agility, and portability, enabling modular and scalable
architectures that align well with the requirements of cloud-native infrastructures.
As these networks increasingly rely on containerized network functions (CNFs) and
edge computing capabilities, ensuring the security of containerized environments
has become a critical priority. The dynamic, ephemeral, and multi-tenant
characteristics of container networks introduce new and complex vulnerabilities that
traditional security models are ill-equipped to address. These include risks such as
kernel sharing, privilege escalation, misconfigured isolation policies, and insecure
inter-container communication. Moreover, the challenges are magnified in
telecommunications infrastructure, where performance, reliability, and isolation are
paramount. This work examines the architectural foundations of container
technology, its evolution and advantages, and its strategic role in enabling advanced
telecom use cases such as mobile edge computing, network slicing, and continuous
integration and deployment. A comprehensive assessment of security threats in
container-based systems is presented, alongside practical mitigation strategies aimed
at securing container runtimes, orchestrators, and network stacks. The study
provides a critical foundation for further research into strengthening the trust,
resilience, and security of container networks in highly dynamic and distributed
telecom environments.