The Document That Defines Your Assessment
The System Security Plan is not a form you fill out to check a box. It is the primary artifact that C3PAO assessors use to understand your environment, evaluate your control implementations, and determine whether your documentation reflects reality. An incomplete or inaccurate SSP is one of the top reasons CMMC assessments stall, produce unexpected findings, or fail outright.
What the SSP Must Cover
The System Security Plan is a living document and must be reviewed and updated at a defined frequency — at least annually — and whenever significant system or environment changes occur.
System Description and Architecture
Assessors need to understand your environment before they can evaluate your controls. The SSP must include a clear description of the system, its purpose in the context of your DoW contracts, and a network and data flow diagram showing how components connect, how CUI flows through the environment, and where the assessment boundary sits.
The architecture section must match the actual environment. Outdated diagrams, missing components, or diagrams that show an idealized architecture rather than the deployed one are among the most common SSP failures.
Boundary Definition
Your SSP must explicitly define what is in scope and why. Every system, application, cloud service, and network component that processes, stores, or transmits CUI should be identified and justified.
Control Implementation Descriptions
For each of the 110 NIST SP 800-171 controls, your System Security Plan (SSP) must describe how the control is actually implemented in your environment — not restate the requirement or simply name a supporting tool. Assessors expect to see operational detail: which systems enforce the control, how they are configured, who is responsible, and what evidence demonstrates the control is functioning. High-level statements like “access is controlled through our identity management system” are rarely sufficient without clear implementation specifics.
Organizations also frequently overlook that CMMC assessments are evaluated at the objective level. Addressing only the control requirement statement is not enough; assessors validate individual assessment objectives beneath each control. While an SSP does not need to document every objective explicitly, it must clearly show where each objective is satisfied, either within the SSP or through referenced policies and procedures. If evidence cannot be traced to every objective, the control may be scored as failed — meaning a single unmet objective can result in failure of the entire control.
Responsible Roles
For each control, the SSP should identify who is responsible for implementation and ongoing management. Assessors will verify that the named individuals or roles exist and are actually performing the described functions.
Interconnections and External Services
Cloud services, external collaboration tools, managed service providers, and other third-party systems that your in-scope environment depends on must be documented. Assessors will evaluate whether your boundary correctly accounts for these dependencies and whether your controls extend appropriately to cover them.
Common SSP Failures
- Control descriptions that summarize what the control requires rather than describing what is implemented
- Architecture diagrams that are out of date or do not match the actual deployed environment
- Missing external services and cloud dependencies
- No linkage between control descriptions and specific evidence artifacts
- Incomplete or absent policy and procedure documentation that controls reference
How Fortreum Approaches SSP Development
- Fortreum’s CMMC advisory practice includes hands-on SSP development support. We work with contractors to document their environment accurately and write control implementation descriptions that satisfy C3PAO assessor standards.
What can Fortreum do for you?
Let us know how Fortreum can help you navigate the changing currents of cybersecurity. For more information, visit the Fortreum website or follow the company on LinkedIn at LinkedIn.com/company/fortreum.
Should you have questions about your FedRAMP, CMMC, cloud and cybersecurity readiness, please reach out to us at Info@fortreum.com or Contact Us at https://fortreum.com/contact/