🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Create a Compliant System Security Plan for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - CA.L2-3.12.4: Step-by-Step Template

Step-by-step template and practical guidance to build a compliant System Security Plan (SSP) and POA&M for CA.L2-3.12.4 under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2.

β€’
April 07, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, step-by-step template for documenting a compliant System Security Plan (SSP) and Plan of Action and Milestones (POA&M) to meet CA.L2-3.12.4 in the Compliance Framework context (NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2), including concrete implementation steps, example entries, technical details, and small-business scenarios.

What CA.L2-3.12.4 requires (practical interpretation)

In Compliance Framework terms, CA.L2-3.12.4 expects organizations to identify security assessment findings and create formal, tracked remediation plans (POA&Ms) that assign owners, resources, milestones, and acceptance criteria β€” then update the SSP to reflect current risk posture. For a small business this means turning assessment output (vulnerability scans, penetration test results, internal audits) into prioritized, measurable remediation actions tied to the SSP.

Step-by-step template you can copy into your SSP/POA&M

Use a consistent POA&M record structure. Below is a practical template you can implement immediately as a spreadsheet or in a simple GRC tool. Each POA&M record should contain at minimum:

- ID: POA-YYYY-NNN
- Control Reference: CA.L2-3.12.4 (and linked 3.12.x controls if relevant)
- Finding Description: concise description of the deficiency (include tool output snippet or reference)
- Impact/Business Context: what CUI/systems/processes are affected and business impact
- Root Cause: e.g., missing patch process, misconfiguration, expired certificate
- CVE/CVSS (if applicable): list CVE IDs and CVSSv3 score for technical prioritization
- Priority/Risk Rating: Critical/High/Medium/Low using a clear rubric (combine CVSS + business criticality)
- Remediation Action: concrete steps (patch, config change, replace device, implement MFA)
- Implementation Tasks/Milestones: break down into subtasks with dates (e.g., test patch in staging, schedule maintenance window, deploy, verify)
- Assigned Owner and Approver: individual responsible and management approver
- Required Resources: estimated FTE hours, budget, contractors, tooling changes
- Start Date / Target Completion Date / Actual Completion Date
- Status: Not Started / In Progress / Deferred / Complete / Accepted Risk
- Verification Evidence: hashes, screenshots, patch IDs (KB numbers), scan report before/after, test results, change ticket links
- Linked SSP Section: pointer to the SSP section that is impacted or updated

Implementation details specific to Compliance Framework (practical tips)

1) Prioritize using a hybrid metric: combine CVSSv3 score with data sensitivity and system criticality. For example, a CVSS 7.5 vulnerability on a machine hosting CUI should be "Critical" even if the score alone is "High."
2) Set SLAs for remediation categories: e.g., Critical: 30 days, High: 60 days, Medium: 180 days, Low: 365 days β€” document these SLAs in your SSP and adhere to them. For small businesses, shorter SLAs on CUI-hosting systems should be enforced.

3) Use automated sources to populate fields: integrate Nessus/Qualys/OpenVAS scan outputs and ticketing APIs (Jira, ServiceNow) to reduce manual errors. Capture the exact scan plugin/CVE and include the scanner run timestamp to show evidence of discovery and remediation validation.

4) Evidence standards: keep before-and-after scans, patch identifiers (for Windows: KB numbers; for Linux: package versions), configuration management commits (e.g., Ansible playbook git hash), and change-control tickets. Store artifacts with WORM or version control and include cryptographic hashes in the POA&M entry.

Small-business real-world examples

Example 1 β€” Outdated VPN appliance OS: Finding: VPN appliance running OS vX. Root cause: vendor EOL and missing patch schedule. Remediation: procure vendor patch, schedule maintenance window, apply patch, verify via scan (no CVE hits). POA&M: assign IT lead, target completion 30 days, evidence: appliance firmware version screenshot, vendor advisory, pre/post vulnerability scan.

Example 2 β€” Missing Multi-Factor Authentication (MFA) for remote access to systems handling CUI: Finding: remote access control allows password-only logins. Remediation: enable vendor MFA or implement SSO with MFA, update access control policy, update SSP with new control implementation description, target completion 45 days, evidence: configuration screenshots, login test logs.

Integration with your SSP and assessment readiness

The SSP must reference active POA&M items, justify any accepted risk, and show a remediation timeline. For CMMC assessors, link each SSP control statement to a POA&M entry when the control is not yet fully implemented. Include status updates and evidence links in the SSP appendix. During pre-assessment, produce a one-page remediation summary (control, percent complete, blockers) for your assessor to show governance and tracking capability.

Compliance tips and best practices

- Keep a single source of truth: maintain POA&M data in one repository (encrypted spreadsheet or GRC) and export snapshots for auditors.
- Automate discovery: schedule weekly automated vulnerability scans and ingest results into the POA&M workflow.
- Enforce change control: every remediation that changes system configuration should go through your change process and have a rollback plan.
- Acceptable risk: formalize risk acceptance using a documented waiver with duration and re-evaluation date; never mark critical findings as "accepted" without executive sign-off.
- Retention and access: retain evidence for the period required by contract and limit POA&M edit access to a small set of roles.

Risk of not implementing CA.L2-3.12.4 properly

Failing to implement a disciplined POA&M and SSP linkage increases the risk of unresolved vulnerabilities leading to data breaches, loss of Controlled Unclassified Information (CUI), contract termination, reputational harm, and potential inability to pass CMMC or NIST assessments. For small businesses, a single exploited vulnerability (e.g., unpatched VPN) can lead to lateral movement and exfiltration of CUI, which can have disproportionate financial and contractual consequences.

Summary: CA.L2-3.12.4 isn’t just paperwork β€” it’s an operational process that converts findings into accountable, traceable remediation actions that update your SSP and demonstrate to assessors that you manage and reduce risk. Implement the POA&M template above, automate evidence collection where possible, enforce SLAs, and keep the SSP current to maintain compliance under the Compliance Framework and CMMC 2.0 Level 2.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes