← davidkoran.com
Documentation Reference

CMMC SSP Template

What a System Security Plan should contain for Level 2 assessment readiness, what assessors examine, and the common failure patterns practitioners encounter.

David W. Koran, RPA  ·  April 2026  ·  David Koran & Associates

The System Security Plan, almost universally referred to as the SSP, is the foundational documentation artifact a contractor produces during preparation for a CMMC Level 2 assessment. The SSP describes the contractor's information system, the security controls that protect the Controlled Unclassified Information processed within it, and the operational practices that maintain those controls over time. A CyberAB Third Party Assessment Organization will examine the SSP before, during, and after the on-site portion of the assessment, and the quality of the SSP determines, more than any other single factor, whether the assessment proceeds smoothly or surfaces findings that delay certification.

Interest in CMMC SSP templates has grown substantially over the past year as practitioners and contractors have come to recognize that the SSP is not a checkbox document. It is the operating record of the security program. Searching for a template is a reasonable starting point, but the template itself is not the deliverable. The deliverable is an SSP that accurately reflects the contractor's environment, that maps every applicable control to a documented implementation, and that survives third-party scrutiny without requiring substantial revision once the assessment begins.

What an SSP Template Should Contain

A usable CMMC SSP template provides the structural framework that the contractor populates with environment-specific content. The structure derives from NIST SP 800-18 and the supplemental guidance in NIST SP 800-171A, which assessors apply when evaluating documentation. The sections below describe the components an SSP template should include for Level 2 assessment readiness.

Section Contents
System Identification System name, identifier, owner, authorizing official, operating status, and the categorization of the information processed
System Environment Physical and operational environment, system architecture, network topology, and the boundary that defines the assessment scope
Information Types Categorization of the information processed, stored, or transmitted, including the CUI categories and any Federal Contract Information
System Interconnections Connections to external systems, the nature of each connection, and the agreements that govern the data flow
Roles and Responsibilities The personnel responsible for system operation, security, and incident response, with their roles and authorities documented
Control Implementation The 110 NIST 800-171 Revision 2 security requirements, with each requirement matched to the specific implementation in the contractor's environment
Plan of Action and Milestones The companion POA&M document referenced from the SSP, identifying any controls not fully implemented and the remediation schedule

The template framework is widely available. Several organizations publish CMMC SSP templates, including consulting firms, software vendors, and the practitioner community. The templates differ in detail and completeness, but the core structural sections are consistent across reputable sources because they derive from the same NIST guidance.

What Distinguishes a Strong SSP from a Weak One

The structural framework establishes the floor. The substance the contractor places into that framework determines whether the SSP is genuinely useful or whether it merely satisfies the procurement gate without surviving assessment scrutiny. Several patterns separate strong SSPs from weak ones.

The first pattern is specificity in the control implementation section. A strong SSP describes how each of the 110 controls is implemented in the contractor's specific environment. The description names the systems, identifies the configurations, references the policies and procedures, and explains how the implementation produces the security outcome the control requires. A weak SSP restates the control language and then asserts compliance without describing how the compliance is actually achieved. Assessors reading the weak SSP cannot verify the implementation against the description because the description does not contain enough detail to verify.

The second pattern is internal consistency. A strong SSP is self-consistent across sections. The system architecture section, the information types section, the control implementation section, and the POA&M all describe the same environment in mutually reinforcing terms. A weak SSP has internal contradictions that emerge under examination. The architecture section describes one boundary; the control implementation section assumes a different boundary. The information types section claims CUI is segregated to a specific subsystem; the control implementation section describes controls applied to a different subsystem. These contradictions become assessment findings even when the underlying security implementation is sound, because they signal that the documentation was not produced by someone with end-to-end visibility into the environment.

The third pattern is alignment between the SSP and operational reality. A strong SSP describes the environment as it actually operates. A weak SSP describes the environment as the documentation author wishes it operated, or as the contractor intends to operate it after some future remediation. Assessors examine operational evidence during the assessment, including system configurations, log records, interview responses, and observed practices. When the documented description does not match the observed reality, the documentation becomes the finding rather than the operational gap. This pattern is one of the largest single sources of avoidable assessment failures.

The fourth pattern is the relationship between the SSP and the POA&M. A strong SSP acknowledges incomplete implementations explicitly and references the POA&M for the remediation schedule. A weak SSP either claims complete implementation that the assessor cannot verify, which produces a finding, or fails to reference the POA&M at all, which produces a documentation finding even if the underlying remediation is appropriate. The artifact integrity question, which is examined in detail in the firm's white paper on artifact integrity, comes back to this relationship.

What Assessors Examine

The CMMC Assessment Process establishes the methodology a CyberAB authorized C3PAO applies during a Level 2 assessment. Assessors evaluate the contractor's environment against the 110 NIST 800-171 Revision 2 requirements through three primary methods: examining documentation, interviewing personnel, and testing or observing implemented controls. The SSP is the central artifact in the documentation examination. Assessors read the SSP before they arrive on site, develop questions and verification points from the SSP content, and use the SSP as the reference against which they compare interview responses and observed practices. When assessor questions or observations diverge from the SSP description, the divergence becomes a finding to investigate, and the contractor whose SSP is comprehensive, accurate, and consistent provides the assessor with fewer divergences to investigate.

The interview component examines whether personnel actually understand and execute the practices the SSP describes. An SSP that documents incident response procedures provides the framework. The interview asks the personnel responsible for incident response to describe what they would do in a specific scenario, and when the response matches the documented procedure, the control is verified. The SSP that anticipates this examination, describing procedures in language that matches operational practice rather than abstract policy, serves the contractor better than an SSP written in language no one in the organization actually applies.

The test or observation component examines the technical implementation of controls through system configurations, audit logs, access control lists, encryption settings, and the operational artifacts the SSP describes. The SSP that points to specific technical evidence and explains how to find it gives the assessor a direct path through the verification work. The SSP that asserts compliance without specifying the evidence requires the assessor to discover the evidence independently, which extends the assessment timeline and increases the probability of findings on items the contractor actually has covered but did not document well.

The SSP and POA&M Relationship

The Plan of Action and Milestones is the companion document to the SSP and addresses controls that are not fully implemented at the time of assessment. The POA&M lists each unimplemented or partially implemented control, the remediation steps, the responsible personnel, and the target completion date. Under the CMMC rules, a Level 2 contractor may achieve conditional certification with a POA&M for certain controls, provided the unimplemented controls do not exceed defined thresholds and the remediation schedule fits the conditional period.

The relationship between the SSP and the POA&M is structural. The SSP control implementation section identifies which controls are fully implemented and which are not. The POA&M provides the remediation detail for the not-fully-implemented controls. A strong SSP and POA&M are mutually consistent, jointly comprehensive, and treat the boundary between them as a documentation discipline rather than a tactical choice about what to disclose.

The temptation to overstate implementation in the SSP and minimize the POA&M creates exposure of two distinct kinds. The first is assessment exposure. The C3PAO will examine the controls the SSP claims are implemented, and overstated implementation produces findings that delay certification. The second is False Claims Act exposure. SPRS scores derive from the SSP and POA&M. A score that reflects overstated implementation creates a representation to the government that misrepresents the contractor's compliance posture. The legal exposure that flows from this misrepresentation is examined in detail at CMMC and the False Claims Act.

Common Failure Patterns in CMMC SSP Development

Practitioners reviewing SSPs developed by contractors or by other consultants encounter several recurring failure patterns. Each pattern is recognizable, and each is correctable with disciplined revision before the assessment begins.

The first failure pattern is the template-as-deliverable problem. The contractor downloads or licenses an SSP template, populates it with high-level descriptions, and treats the populated template as the SSP. The result is a document that satisfies the structural requirement but contains no environment-specific substance. The C3PAO assessment exposes the gap immediately because the document does not describe the contractor's actual environment in enough detail to verify any of the controls.

The second failure pattern is the policy-document substitution. The contractor uses corporate security policies as the control implementation content in the SSP. Policies describe what the organization intends to do. The SSP control implementation section should describe what the organization actually does. Substituting policy language for implementation description produces a document that reads as compliant but does not survive operational verification.

The third failure pattern is the boundary inconsistency. The SSP describes the assessment boundary in one section and the control implementation in another, and the two descriptions do not align. The contractor's actual environment fits one description but not the other. The C3PAO probes this inconsistency early in the assessment because it signals the SSP was not produced by someone with end-to-end visibility, and the probe frequently surfaces additional issues that propagate through the assessment.

The fourth failure pattern is the absent or stale POA&M. The SSP claims complete or substantial implementation across most controls, and the POA&M is either missing entirely or describes remediation completed many months earlier. The assessor cannot verify the claimed implementation against the operational evidence and cannot find the POA&M record that should explain the gap. The combination produces a finding pattern that delays certification more than the underlying controls would have required. A related variant arises when the SSP was developed by a credentialed practitioner who lacked sufficient access to the contractor's actual environment to describe it accurately. The document reads professionally and is structurally sound but does not match operational reality, and the divergence surfaces during the assessment when the documented description and the observed environment do not align.

The Sample SSP and POA&M Reference

The firm publishes a sample SSP and POA&M package for the Cogswell Cogs reference contractor as a practitioner reference. The package illustrates the structural approach, the level of substantive detail expected in the control implementation section, and the relationship between the SSP and the POA&M as a coherent documentation pair. The package is available as a free download and is intended for practitioners and contractors evaluating their own SSP work against an external example. The reference is published at CMMC Sample SSP and POA&M.

The sample is not a template. It is a worked example. A template provides empty structural sections for the contractor to populate. A worked example shows the structure populated with substantive content for a specific reference environment, demonstrating what the populated document looks like when the work has been done correctly. The worked example is more useful than a template for contractors who have already started their SSP and want to evaluate the substance of what they have produced.

When Practitioner Support Becomes Useful

Contractors developing an SSP without prior CMMC experience frequently encounter the patterns described above. Practitioner support during SSP development addresses these patterns by bringing external visibility into the contractor's environment, applying assessment-aware judgment to the documentation choices, and producing an SSP that reflects the operational reality with the level of detail assessors require. The support can take several forms, from full SSP development as a deliverable, to SSP review and revision against an existing draft, to focused work on the control implementation section while the contractor's internal team handles the structural sections. The form that fits depends on where the contractor is in the documentation process and what internal resources are available to do the work. The conversation about which form fits is the first step.

About the Author

David W. Koran

David Koran is a CyberAB Registered Practitioner Advanced and the founder of a CMMC advisory practice serving Defense Industrial Base contractors and the legal counsel who support them. The firm focuses on readiness, enablement, and implementation work, and does not perform CMMC certification assessments under any circumstances.

He is the author of The CMMC Decision, now in its second edition, and an Associate Member of the American Bar Association Section of Public Contract Law.

dkoran@davidkoran.com  |  802-335-2662

CyberAB Registered Practitioner Advanced
ABA Section of Public Contract Law
Author, The CMMC Decision