Privilege escalation is the quiet killer inside systems. It turns small mistakes into total compromise. In environments built with mutable servers and ad hoc administration, a single leaked credential or unpatched service can give an attacker complete control. Every fix feels like a race against time. The attack surface grows faster than you can trim it.
Immutable infrastructure changes that equation. If every server, container, and function is replaced instead of patched, persistence becomes nearly impossible. When nothing changes in place, and every change comes from a trusted build pipeline, the window for privilege escalation attacks slams shut. There are no long-lived admin sessions, no snowflake servers with special tweaks, no stale scripts sitting in /tmp.
Privilege escalation thrives on drift. Immutable design removes drift by definition. A server's state is born in code, validated before deploy, and never altered in the wild. Any compromise is destroyed by replacement. Admin access is designed out of the runtime. If someone attempts elevation, their access dies along with the compromised instance.