Available frameworks
List all framework mappings installed with Kensa:| Framework | Mapping ID | Description |
|---|---|---|
| CIS RHEL 9 v2.0.0 | cis-rhel9-v2.0.0 | Center for Internet Security Benchmark |
| STIG RHEL 9 V2R7 | stig-rhel9-v2r7 | DISA Security Technical Implementation Guide |
| NIST 800-53 R5 | nist-800-53-r5 | NIST Security Controls |
| PCI-DSS v4.0 | pci-dss-v4.0 | Payment Card Industry Data Security Standard |
| FedRAMP Moderate | fedramp-moderate | Federal Risk and Authorization Management Program |
| CIS RHEL 8 v4.0.0 | cis-rhel8-v4.0.0 | CIS Benchmark for RHEL 8 |
| STIG RHEL 8 V2R6 | stig-rhel8-v2r6 | STIG for RHEL 8 |
How framework mappings work
Frameworks are metadata, not structure. A single rule likessh-disable-root-login maps to multiple frameworks simultaneously:
Filtering by framework
Run only rules mapped to a specific benchmark:Coverage reports
Show how completely a framework mapping is implemented:Framework-specific defaults
When you filter by framework, Kensa automatically loads framework-specific variable values. This adjusts thresholds to match the framework’s requirements without manual overrides. For example, CIS allowspam_pwquality_minlen: 14 while STIG requires 15. Running with -f cis-rhel9-v2.0.0 uses the CIS value; running without a framework filter uses the STIG default.
See Configuration for details on variable precedence.