A comprehensive Rust-based platform for automating FedRAMP compliance processes, document conversion, and security control management.
- Document Parser & Converter: Transform Excel/Word FedRAMP documents into OSCAL JSON
- Compliance Dashboard: Real-time tracking of control implementation status
- Gap Analysis Tool: Automated compliance gap identification and remediation planning
- Control Mapping Engine: Cross-framework control relationships (NIST 800-53, 800-171, CIS)
- Risk Assessment Platform: Automated FIPS 199 categorization and impact analysis
- POA&M Management: Vulnerability tracking and remediation workflows
- SSP Generator: Automated System Security Plan creation
- Compliance Reporting: Audit-ready report generation
- CI/CD Integration: Security pipeline integration for DevSecOps
This is a Rust monorepo with the following structure:
crates/
├── fedramp-core/ # Core data models and utilities
├── document-parser/ # Document parsing and OSCAL conversion
├── compliance-dashboard/ # Real-time compliance visualization
├── gap-analysis/ # Compliance gap detection and analysis
├── control-mapping/ # Cross-framework control mapping
├── risk-assessment/ # FIPS 199 and risk analysis
├── poam-management/ # POA&M lifecycle management
├── ssp-generator/ # System Security Plan generation
├── compliance-reporting/ # Report generation engine
├── inheritance-tracker/ # Control responsibility tracking
├── cicd-pipeline/ # CI/CD security integration
├── framework-converter/ # Multi-framework conversion
├── audit-trail/ # Comprehensive audit logging
├── fedramp-api/ # REST API server
├── fedramp-cli/ # Command-line interface
└── fedramp-web/ # Web frontend
- Rust 1.70+ (managed via
rust-toolchain.toml
) - PostgreSQL 15+
- Redis 7+
- Docker & Docker Compose (for development)
-
Clone the repository:
git clone https://github.com/Elevated-Standards/mappings.git cd mappings
-
Setup development environment:
make setup
-
Start development services:
make db-setup
-
Run the API server:
make dev
-
Use the CLI tool:
make cli -- --help
# Development
make dev # Start API server
make cli # Run CLI tool
make watch # Continuous development with auto-reload
# Building
make build # Build all crates
make build-api # Build API server only
make build-cli # Build CLI tool only
# Testing
make test # Run all tests
make clippy # Run lints
make fmt # Format code
# Docker
make docker # Build Docker images
docker-compose -f ops/docker/docker-compose.yml up
# Parse FedRAMP documents
fedramp parse --input documents/ --output oscal/
# Analyze compliance gaps
fedramp analyze --baseline moderate --framework nist-800-53
# Generate reports
fedramp report --type assessment --output reports/
# Generate SSP
fedramp ssp --template fedramp --system-name "My System"
# Convert between frameworks
fedramp convert --from nist-800-53 --to nist-800-171 --input controls.json
# Upload and parse document
curl -X POST http://localhost:8080/api/v1/documents/parse \
-F "file=@poam.xlsx" \
-F "type=poam"
# Get compliance status
curl http://localhost:8080/api/v1/compliance/status
# Generate gap analysis
curl -X POST http://localhost:8080/api/v1/analysis/gaps \
-H "Content-Type: application/json" \
-d '{"baseline": "moderate", "framework": "nist-800-53"}'
The platform uses configuration files in the config/
directory:
config/default.toml
- Default configurationconfig/development.toml
- Development overridesconfig/production.toml
- Production settings
Key configuration sections:
- Database connection settings
- API server configuration
- Document processing settings
- Framework mapping configurations
- Security and authentication settings
# Run all tests
cargo test --workspace
# Run specific crate tests
cargo test -p document-parser
# Run integration tests
cargo test --test '*'
# Generate test coverage
cargo tarpaulin --workspace
The platform includes comprehensive monitoring:
- Health check endpoints (
/health
,/metrics
) - Structured logging with tracing
- Performance metrics collection
- Audit trail for all operations
- Role-based access control (RBAC)
- JWT-based authentication
- Input validation and sanitization
- Audit logging for all operations
- Secure document processing
# Build and run with Docker Compose
docker-compose -f ops/docker/docker-compose.yml up -d
# Or build individual containers
docker build -t fedramp-api -f ops/docker/Dockerfile.api .
See ops/
directory for:
- Kubernetes manifests
- Terraform configurations
- CI/CD pipeline definitions
- Monitoring and alerting setup
- Fork the repository
- Create a feature branch
- Make your changes
- Add tests
- Run
make test clippy fmt
- Submit a pull request
This project is licensed under the MIT OR Apache-2.0 license.