🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build an Audit-Ready System Security Plan for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - CA.L2-3.12.4: Step-by-Step Template for Defining Boundaries, Environments, and System Connections

Step-by-step, practical template for documenting system boundaries, operational environments, and external connections to build an audit-ready SSP that meets NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 CA.L2-3.12.4 requirements.

•
March 26, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Meeting CMMC 2.0 Level 2 (CA.L2-3.12.4) and the associated NIST SP 800-171 expectations requires an explicit, auditable System Security Plan (SSP) that clearly defines system boundaries, distinguishes operational environments, and documents all system connections; this post gives a step-by-step template and concrete examples small businesses can implement today to create an audit-ready SSP.

Step-by-step template: who, what, and why

1) Identify the system and scope — inventory and boundary statement

Start with a single, precise boundary statement for each system that processes, stores, or transmits Controlled Unclassified Information (CUI). In the SSP include: system name, owner, business purpose, physical/logical location, and an explicit boundary sentence (for example: "Boundary: CRM System - logical subnet 10.10.10.0/24, AWS account 123456789012 in us-east-1, hosts crm-prod-1.company.local; purpose: CUI customer PII storage for contract ABC"). Use a CMDB or spreadsheet with fields: system_id, owner, classification (CUI yes/no), boundary_description, primary_contacts, last_updated. Tools: NetBox or a simple CMDB in SharePoint/Confluence for small shops; export capability matters for audits.

2) Define environments — production, staging, development, and test

Explicitly document every environment that touches the system and what is allowed in each. For each environment record: environment name, separation mechanism (VLAN ID, cloud VPC/subnet, separate account), allowed data types (no CUI in dev unless sanitized), access restrictions, and refresh procedures. Example: "Dev: AWS account xyz-dev, VPC vpc-0abc, no CUI permitted; CI/CD secrets redacted; access limited to SRE group via bastion host (jump-prod.company.local) with MFA + SSH certs." For small businesses, enforce segregation by using separate cloud accounts or at minimum separate VPCs/subnets and IAM roles—document the exact controls in the SSP.

3) Map system connections and data flows — create an interface matrix and DFDs

Produce at least two artifacts: a Data Flow Diagram (DFD) showing high-level flows of CUI, and a System Connections Matrix listing each external/internal connection. Matrix columns should include: source system, destination system, protocol/port, direction (inbound/outbound), transport protection (TLS version, IPsec), authentication method, business justification, and authoritative agreement (ISA/MOU). Example row: "CRM-prod -> Accounting-API (10.10.20.5:443), HTTPS/TLS1.2 mutual TLS, outbound from CRM, REST API for invoicing, ISA signed 2025-01-10." For tools, use draw.io for DFDs and a CSV/Excel for the matrix; ensure diagrams are version-controlled and linked from the SSP.

4) Document enforcement points and technical controls

For every boundary and connection, describe how the organization enforces security: firewalls (with rule IDs), security group rules, VLANs, WAF rules, VPN tunnels, IDS/IPS sensors, and NAC. Include sample technical details: "Perimeter firewall rule #205: allow TCP 443 from 203.0.113.0/24 to 10.10.10.0/24 for vendor X API; logged to SIEM; reviewed monthly." For cloud, list security group IDs, IAM role names, and VPC endpoint configurations. Also document monitoring and logging endpoints (syslog/S3 bucket names, retention, and SIEM correlation rules) to show evidence of control implementation and monitoring aligned to CA.L2-3.12.4.

5) Evidence, approval, and maintenance processes

Auditors want artifacts and an evidence trail. In the SSP append or link to: signed Interconnection Security Agreements (ISAs), boundary diagrams, change control tickets for boundary changes, vulnerability scan reports for boundary devices, firewall rule change logs, and periodic review attestations (owner review every 90 days). Include a change-control procedure: who approves boundary changes, how to update the SSP (version control rules), and how evidence is archived (retention policy). For small businesses, a practical approach is to store artifacts in a controlled folder (SaaS repository) with naming conventions like SSP_system_v1.3_2026-03-01.pdf and record approval via email or e-signature saved with the artifact.

Implementation tips, small-business scenarios, and technical specifics

Small-business example: an SMB with a cloud-hosted CRM and an on-premise accounting server should document (1) the CRM AWS account, app subnet CIDR, security group IDs, and the IAM role used for the service; (2) the VPN tunnel (vendor: OpenVPN Cloud) configuration including peer IPs and crypto suite; (3) explicit allowed ports (443/tcp only) and TLS 1.2+/mutual auth requirement. Practical tips: use CIDR blocks and hostnames in the SSP for clarity, include screenshots of firewall rules and cloud console settings for proof, and maintain a one-page "connection summary" that non-technical auditors can read while the technical appendices provide full details.

Risk of not implementing this requirement is real: undefined boundaries and undocumented connections lead to undetected CUI exposure, lateral movement in the event of compromise, failed audits, and contract loss. Specific outcomes include inability to demonstrate isolation of CUI (leading to CAPs/POA&Ms), missed insecure services (e.g., legacy HTTP exposed), and discrepancies between actual topology and SSP claims—auditors will record those as findings.

Best practices: keep the SSP concise but cross-reference detailed appendices, automate evidence collection where possible (use scripts to export current security group rules, firewall configs, and host inventories), run quarterly walkthroughs with control owners, and treat the SSP as a living document tied to your CMDB and change-control system. Map each entry to the relevant control(s) and POA&M items in a traceability matrix so auditors can see coverage for CA.L2-3.12.4 and related requirements.

In summary, an audit-ready SSP for CA.L2-3.12.4 is built from clear boundary statements, explicit environment separation, a complete system connections matrix, technical enforcement details, and a solid evidence and maintenance process. Use the step-by-step template above, collect and version artifacts, and run periodic reviews to keep the plan aligned with reality—doing so reduces risk and positions your organization to pass audits and maintain contracts that require NIST SP 800-171 / CMMC 2.0 Level 2 compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes