Kubernetes Controller Manager must disable profiling.

STIG ID: CNTR-K8-000910  |  SRG: SRG-APP-000141-CTR-000315 |  Severity: medium |  CCI: CCI-000381 |  Vulnerability Id: V-242409

Vulnerability Discussion

Kubernetes profiling provides the ability to analyze and troubleshoot Controller Manager events over a web interface on a host port. Enabling this service can expose details about the Kubernetes architecture. This service must not be enabled unless deemed necessary.

Check

Change to the /etc/kubernetes/manifests/ directory on the Kubernetes Control Plane. Run the command:
grep -i profiling *

If the setting "profiling" is not configured in the Kubernetes Controller Manager manifest file or it is set to "True", this is a finding.

Fix

Edit the Kubernetes Controller Manager manifest file in the /etc/kubernetes/manifests directory on the Kubernetes Control Plane. Set the argument "--profiling value" to "false".