rampart bench scores your policy against a corpus of real-world attack patterns. Each test case is tagged with severity and MITRE ATT&CK technique IDs, giving you coverage metrics that map to threat intelligence frameworks.
Quick Start
Output
Flags
| Flag | Default | Description |
|---|---|---|
--policy | ~/.rampart/policies/standard.yaml | Policy file to benchmark |
--corpus | Built-in corpus | Path to custom corpus YAML |
--os | linux | Filter cases by OS: linux, darwin, windows, * |
--severity | medium | Minimum severity to include: critical, high, medium |
--min-coverage | — | Exit 1 if weighted coverage is below this percent |
--strict | false | Only count deny as covered (not watch or ask) |
--id | — | Run only cases with this ID prefix |
--category | — | Filter to a single corpus category |
--json | false | Output results as JSON |
--verbose | false | Include per-case results |
CI Integration
Add benchmarking to your CI pipeline to catch policy regressions:--strict to ensure critical patterns result in deny, not just watch.
MITRE ATT&CK Mapping
Each test case in the corpus is tagged with MITRE ATT&CK technique IDs:- Compliance reporting — map coverage to frameworks your org uses
- Gap analysis — identify ATT&CK techniques with weak coverage
- Red team validation — verify your policy catches known TTPs
Weighted Scoring
The weighted score prioritizes critical and high-severity patterns:| Severity | Weight |
|---|---|
| critical | 3x |
| high | 2x |
| medium | 1x |
Custom Corpus
Create a custom corpus for your specific environment:Filtering
Run a subset of tests:JSON Output
For programmatic processing:See Also
- CI/Headless Agents — enforce coverage thresholds in CI