{
  "title": "How to Create an Audit-Ready System Security Plan (SSP) for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - CA.L2-3.12.4: Step-by-Step Template for Boundaries, Environments, and Connections",
  "date": "2026-04-14",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-create-an-audit-ready-system-security-plan-ssp-for-nist-sp-800-171-rev2-cmmc-20-level-2-control-cal2-3124-step-by-step-template-for-boundaries-environments-and-connections.jpg",
  "content": {
    "full_html": "<p>This post gives a step-by-step, audit-ready template for the System Security Plan (SSP) sections required to satisfy CMMC 2.0 Level 2 / NIST SP 800-171 Rev.2 control CA.L2-3.12.4, focusing on documenting system boundaries, environments, and connections in a way that satisfies assessors and supports continuous monitoring for small businesses handling CUI.</p>\n\n<h2>What CA.L2-3.12.4 expects (practical interpretation)</h2>\n<p>At CMMC Level 2 the CA family expects documented, verifiable assessment and oversight of systems that process, store, or transmit Controlled Unclassified Information (CUI). Practically this means your SSP must clearly identify the system boundary (where CUI is in scope), the distinct environments (production, development, test, DR), and all inbound/outbound connections (third-party, remote access, cloud integrations) with associated controls and monitoring. The goal is traceability: an assessor should be able to map each connection and environment to implemented controls, logging, and vulnerability scanning evidence.</p>\n\n<h2>Step-by-step SSP template: sections to include</h2>\n<p>Use the following high-level sections in your SSP for CA.L2-3.12.4. For each section include owner, contact, last updated date, and links to evidence (diagrams, configs, scan results):\n- System Identification (Name, version, physical locations, CUI types)\n- System Boundary Diagram (network, cloud, data flows)\n- Environments (production/test/dev/DR and data handling rules)\n- External Connections (vendor APIs, cloud endpoints, VPNs, inter-facility links)\n- Controls Applied to Each Connection/Boundary (firewall rules, encryption, ACLs)\n- Monitoring and Assessment Plan (vulnerability scan cadence, log retention, SIEM)\n- Authorization and POA&M status (current authorization, open findings)\nA small-business example: a 15-person DoD subcontractor might have a single \"CUI System\" hosted in Azure, a production VNet, a separate dev subscription, and two third-party telemetry connections—each of these must be listed and mapped to controls.</p>\n\n<h3>How to build the System Boundary Diagram</h3>\n<p>Draw a single-page diagram that is readable by auditors and includes: trust zones (CUI zone vs non-CUI), IP ranges (CIDR), VLANs, cloud VNet IDs, firewall/NGFW instances, load balancers, and data flow arrows showing encryption in transit. Example notations: \"Prod VNet: 10.10.0.0/16 (CUI in scope)\", \"Dev VNet: 10.20.0.0/16 (non-CUI; sanitized copies only)\", \"VPN Gateway: public IP 203.0.113.45 -> tunnel to corporate firewall\". Use text boxes to reference the specific evidence files (e.g., Azure Network Security Group rules file: evidence/azure-nsg-prod-2026-03-01.json). Tools: draw.io or Lucidchart exports plus an index of linked evidence stored in your compliance repo.</p>\n\n<h3>Documenting Environments and segregation</h3>\n<p>For each environment state: purpose, data classification allowed, access controls, build/release process, and sanitization policies. Example: \"Test environment receives sanitized CUI only via an automated masker (script v1.2, repo link) and is rebuilt nightly using IaC templates (Terraform v1.4) stored in a protected repo with branch protections.\" Specify CI/CD pipeline controls (least privilege service accounts, artifact signing), and note whether developer machines have access to production. For a small business, minimally keep dev/test in separate accounts/subscriptions and enforce different network ACLs and IAM roles to prevent accidental data exfiltration.</p>\n\n<h3>Mapping and securing Connections (external and remote)</h3>\n<p>List each connection with: purpose, owner, protocol/ports, endpoints, authentication method, encryption (TLS version), firewall policy examples, and monitoring. Example entry: \"Third-party analytics API – Owner: IT Ops – Purpose: usage telemetry – Endpoint: api.thirdparty.example.com (198.51.100.22) – Protocol: HTTPS (TLS 1.2+, mTLS optional) – Firewall: allow outbound TCP 443 from 10.10.1.0/24 -> 198.51.100.22; rule ID FW-PROD-OUT-001.\" Recommended technical controls: enforce TLS 1.2+/1.3, use mutual TLS or OAuth with short-lived tokens for machine-to-machine, restrict source IPs in firewall rules, and use jump/bastion hosts for admin access with MFA and session recording. Document vendor contracts that require security controls and evidence of their security posture (AUP, SOC reports).</p>\n\n<h2>Monitoring, assessment evidence, and continuous compliance</h2>\n<p>Include a Monitoring & Assessment Plan section that lists tools, frequency, owners, and expected outputs: vulnerability scans (monthly, e.g., Nessus/OpenVAS), authenticated scans against in-scope hosts, weekly log aggregation to SIEM (or cloud-native equivalent), daily alerting for critical indicators, and quarterly penetration tests. Attach scan reports, ticket IDs for remedial actions, and POA&M entries with due dates and owners. Evidence examples for small businesses: monthly vulnerability report PDFs, CloudTrail logs retained 1 year, firewall rule export snapshots, and screenshots of IAM role definitions. Define retention policies (logs 1 year; scan results 3 years) to satisfy assessors' expectations for reproducible evidence.</p>\n\n<p>Risk of not implementing this requirement: incomplete or inaccurate boundaries and connection documentation leads to scope creep, missed vulnerabilities, and failed assessments. For a small business this can mean losing DoD contracts, costly remediation under time pressure, and potential CUI exposure. Technical risks include misconfigured NAT/firewall rules accidentally allowing lateral movement, insufficient encryption for a vendor API, or test data containing real CUI—any of which can result in compliance failure and real-world data breaches.</p>\n\n<p>Summary: build your SSP so that boundaries, environments, and connections are explicit, diagrammed, and mapped to implemented controls and evidence. Use the template sections above, include concrete artifacts (network exports, scan reports, IaC templates), automate evidence collection where possible, and schedule regular reassessments. For small businesses, prioritize clear diagrams, strict separation of prod/test, MFA and logged admin access, monthly vulnerability scanning, and a living POA&M—these practical steps will make CA.L2-3.12.4 audits straightforward and reduce operational risk.</p>",
    "plain_text": "This post gives a step-by-step, audit-ready template for the System Security Plan (SSP) sections required to satisfy CMMC 2.0 Level 2 / NIST SP 800-171 Rev.2 control CA.L2-3.12.4, focusing on documenting system boundaries, environments, and connections in a way that satisfies assessors and supports continuous monitoring for small businesses handling CUI.\n\nWhat CA.L2-3.12.4 expects (practical interpretation)\nAt CMMC Level 2 the CA family expects documented, verifiable assessment and oversight of systems that process, store, or transmit Controlled Unclassified Information (CUI). Practically this means your SSP must clearly identify the system boundary (where CUI is in scope), the distinct environments (production, development, test, DR), and all inbound/outbound connections (third-party, remote access, cloud integrations) with associated controls and monitoring. The goal is traceability: an assessor should be able to map each connection and environment to implemented controls, logging, and vulnerability scanning evidence.\n\nStep-by-step SSP template: sections to include\nUse the following high-level sections in your SSP for CA.L2-3.12.4. For each section include owner, contact, last updated date, and links to evidence (diagrams, configs, scan results):\n- System Identification (Name, version, physical locations, CUI types)\n- System Boundary Diagram (network, cloud, data flows)\n- Environments (production/test/dev/DR and data handling rules)\n- External Connections (vendor APIs, cloud endpoints, VPNs, inter-facility links)\n- Controls Applied to Each Connection/Boundary (firewall rules, encryption, ACLs)\n- Monitoring and Assessment Plan (vulnerability scan cadence, log retention, SIEM)\n- Authorization and POA&M status (current authorization, open findings)\nA small-business example: a 15-person DoD subcontractor might have a single \"CUI System\" hosted in Azure, a production VNet, a separate dev subscription, and two third-party telemetry connections—each of these must be listed and mapped to controls.\n\nHow to build the System Boundary Diagram\nDraw a single-page diagram that is readable by auditors and includes: trust zones (CUI zone vs non-CUI), IP ranges (CIDR), VLANs, cloud VNet IDs, firewall/NGFW instances, load balancers, and data flow arrows showing encryption in transit. Example notations: \"Prod VNet: 10.10.0.0/16 (CUI in scope)\", \"Dev VNet: 10.20.0.0/16 (non-CUI; sanitized copies only)\", \"VPN Gateway: public IP 203.0.113.45 -> tunnel to corporate firewall\". Use text boxes to reference the specific evidence files (e.g., Azure Network Security Group rules file: evidence/azure-nsg-prod-2026-03-01.json). Tools: draw.io or Lucidchart exports plus an index of linked evidence stored in your compliance repo.\n\nDocumenting Environments and segregation\nFor each environment state: purpose, data classification allowed, access controls, build/release process, and sanitization policies. Example: \"Test environment receives sanitized CUI only via an automated masker (script v1.2, repo link) and is rebuilt nightly using IaC templates (Terraform v1.4) stored in a protected repo with branch protections.\" Specify CI/CD pipeline controls (least privilege service accounts, artifact signing), and note whether developer machines have access to production. For a small business, minimally keep dev/test in separate accounts/subscriptions and enforce different network ACLs and IAM roles to prevent accidental data exfiltration.\n\nMapping and securing Connections (external and remote)\nList each connection with: purpose, owner, protocol/ports, endpoints, authentication method, encryption (TLS version), firewall policy examples, and monitoring. Example entry: \"Third-party analytics API – Owner: IT Ops – Purpose: usage telemetry – Endpoint: api.thirdparty.example.com (198.51.100.22) – Protocol: HTTPS (TLS 1.2+, mTLS optional) – Firewall: allow outbound TCP 443 from 10.10.1.0/24 -> 198.51.100.22; rule ID FW-PROD-OUT-001.\" Recommended technical controls: enforce TLS 1.2+/1.3, use mutual TLS or OAuth with short-lived tokens for machine-to-machine, restrict source IPs in firewall rules, and use jump/bastion hosts for admin access with MFA and session recording. Document vendor contracts that require security controls and evidence of their security posture (AUP, SOC reports).\n\nMonitoring, assessment evidence, and continuous compliance\nInclude a Monitoring & Assessment Plan section that lists tools, frequency, owners, and expected outputs: vulnerability scans (monthly, e.g., Nessus/OpenVAS), authenticated scans against in-scope hosts, weekly log aggregation to SIEM (or cloud-native equivalent), daily alerting for critical indicators, and quarterly penetration tests. Attach scan reports, ticket IDs for remedial actions, and POA&M entries with due dates and owners. Evidence examples for small businesses: monthly vulnerability report PDFs, CloudTrail logs retained 1 year, firewall rule export snapshots, and screenshots of IAM role definitions. Define retention policies (logs 1 year; scan results 3 years) to satisfy assessors' expectations for reproducible evidence.\n\nRisk of not implementing this requirement: incomplete or inaccurate boundaries and connection documentation leads to scope creep, missed vulnerabilities, and failed assessments. For a small business this can mean losing DoD contracts, costly remediation under time pressure, and potential CUI exposure. Technical risks include misconfigured NAT/firewall rules accidentally allowing lateral movement, insufficient encryption for a vendor API, or test data containing real CUI—any of which can result in compliance failure and real-world data breaches.\n\nSummary: build your SSP so that boundaries, environments, and connections are explicit, diagrammed, and mapped to implemented controls and evidence. Use the template sections above, include concrete artifacts (network exports, scan reports, IaC templates), automate evidence collection where possible, and schedule regular reassessments. For small businesses, prioritize clear diagrams, strict separation of prod/test, MFA and logged admin access, monthly vulnerability scanning, and a living POA&M—these practical steps will make CA.L2-3.12.4 audits straightforward and reduce operational risk."
  },
  "metadata": {
    "description": "Step-by-step guidance and a practical template to document system boundaries, operational environments, and external connections in an audit-ready SSP for CMMC 2.0 Level 2 / NIST SP 800-171 rev.2 control CA.L2-3.12.4.",
    "permalink": "/how-to-create-an-audit-ready-system-security-plan-ssp-for-nist-sp-800-171-rev2-cmmc-20-level-2-control-cal2-3124-step-by-step-template-for-boundaries-environments-and-connections.json",
    "categories": [],
    "tags": []
  }
}