🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Develop a Plan of Action (POA&M) for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - CA.L2-3.12.2: Step-by-Step Template to Correct Deficiencies

Step-by-step POA&M template to help organizations document, prioritize, and remediate deficiencies to meet CA.L2-3.12.2 under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2.

April 05, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

CA.L2-3.12.2 requires organizations operating under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 to develop and implement Plans of Action and Milestones (POA&Ms) to correct deficiencies and reduce or eliminate vulnerabilities; this post gives a practical, step-by-step POA&M template you can use in a small-business environment to turn assessment findings into tracked, verifiable remediation activities.

What CA.L2-3.12.2 means for your Compliance Framework

At its core CA.L2-3.12.2 is about accountability and measurable remediation: when an assessment, test, or audit uncovers a deficiency, you must document the issue, assign ownership, estimate resources, set milestones, and produce verifiable evidence that the deficiency is resolved or mitigated. For small businesses focused on CUI handling, this ties directly into your System Security Plan (SSP) and your risk management processes; your POA&M is the operational bridge between “we know there’s a problem” and “we can prove it was fixed.”

POA&M Template — fields and practical implementation

Use the following POA&M fields as a baseline; each should be a column or attributes in whatever tracking system you adopt (CSV, spreadsheet, ticketing system, GRC tool): ID, Control Reference (e.g., CA.L2-3.12.2 / NIST 3.12.2), Deficiency Description, Business Impact, Evidence of Finding, Risk Rating (e.g., CVSS or custom matrix), Remediation Category (patch/config/code/process), Remediation Tasks, Owner (name & role), Required Resources (person-hours, budget, tools), Start Date, Target Completion Date, Milestones (with dates), Verification Method (test/scan/inspection), Evidence Artifacts (screenshots, logs, test results), Current Status (Open/In Progress/Closed), Compensating Controls (if any), and Last Updated. Implement this in a single canonical repository (e.g., a secured SharePoint, Jira project, or a simple encrypted spreadsheet) and restrict edit rights to owners and auditors.

Step 1 — Identify, classify and prioritize

Begin by converting assessment outputs into POA&M entries. For each finding, capture the original evidence (vulnerability scan report, assessment note, penetration test output). Prioritize using an objective method: run CVSS on technical findings (e.g., remote code execution = high CVSS >9), combine with business impact (does it expose CUI?) and threat likelihood (external internet-facing services are higher). Example: a small development firm discovers remote desktop enabled on a CUI server with no MFA — CVSS 7.5 plus high business impact should move this to “Immediate (30 days)”.

Step 2 — Define remediation tasks, dependencies, and acceptance criteria

Break each POA&M into concrete tasks with clear owners and acceptance criteria. For the RDP/MFA example, tasks might be: (1) identify all hosts running RDP (Nmap + internal asset inventory), (2) disable RDP or restrict via firewall rules, (3) implement MFA via identity provider (Okta/Duo/Azure AD) for remote access, (4) patch and harden remaining hosts to CIS benchmarks, (5) run authenticated vulnerability scan and confirm findings cleared. Acceptance criteria must be measurable: “No response on TCP/3389 from public IPs; MFA enforced for accounts accessing CUI environment; authenticated scan shows 0 critical/7+ CVSS findings for RDP-related checks.”

Technical steps for implementation and verification

Use automation where possible. Schedule authenticated vulnerability scans (Nessus/Qualys/OpenVAS) weekly for internet-facing assets and monthly for internal assets. Use configuration management tools (Ansible, SCCM, Intune) to apply patches and track compliance baselines. For verification: attach scan result exports, SIEM logs showing MFA succeed/fail events, firewall rule snapshots, and change-control tickets. Capture hash values or signed PDFs of these artifacts to prevent tampering. For code or application fixes, include build artifacts and test results (unit/integration) and a documented roll-forward plan in case of regressions.

Tracking cadence, reporting and integration with your Compliance Framework

Set a POA&M lifecycle: initial entry at time of finding, weekly tactical review by owners, monthly program review by the security manager, and quarterly executive reporting. Link each POA&M item to the corresponding SSP control statement; when a POA&M is closed, update the SSP and notify the contracting officer or assessor as required. Use ticketing systems (Jira/Trello) so status changes are auditable. Include a column for compensating controls and a review date when a compensating control must be reassessed to ensure continued effectiveness.

Risk of not implementing POA&Ms and real-world small-business scenarios

Failing to maintain POA&Ms poses material risks: continued exposure of CUI, higher probability of breaches, contract termination or ineligibility for DoD work, and potential fines. Practical small-business examples: a 10-person subcontractor ignores a high-severity SQL injection finding — attackers leverage it to exfiltrate CUI; because no POA&M existed, there’s no documented remediation path and the prime contractor removes the subcontract. Another example: a company delays MFA implementation for 9 months, gets credential-phished, and loses access to build systems — recovery costs and reputational damage far exceed the short-term cost of implementing an IdP and POA&M-tracked remediation.

Compliance tips and best practices

Keep POA&Ms realistic and evidence-backed: don’t list “evaluate” as a remediation — list actions with time-boxed milestones. Use objective scoring (CVSS + business impact) and group similar findings into a single POA&M when practical (e.g., “Harden Windows endpoints to CIS benchmark” rather than 25 discrete identical findings). Where resources are limited, consider compensating controls documented with expiration and reevaluation dates, or use MSSP services for rapid implementation of IDS/endpoint controls. Automate evidence collection (scan exports, MFA logs) and protect the POA&M repository with role-based access and integrity controls. Finally, rehearse closure steps: when you mark an item closed, perform the verification scans and retain the artifacts for at least 3 years or per contract requirements.

Summary: CA.L2-3.12.2 requires more than a checklist — it requires an auditable, prioritized, and evidence-driven remediation program. Use the template fields above, prioritize with CVSS and business impact, assign clear owners, define measurable acceptance criteria, automate verification where possible, and maintain regular reviews. For small businesses, practical choices like managed identity providers, scheduled vulnerability scans, and a simple ticket-driven POA&M repository will deliver compliance and materially reduce risk while preserving your ability to win and keep federal contracts.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes