🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Prepare an SSP for Assessment: Evidence, Artifacts, and Checklists for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - CA.L2-3.12.4

Step-by-step guidance for creating an SSP and assembling evidence, artifacts, and assessor-ready checklists to meet CA.L2-3.12.4 under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2.

•
March 28, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to prepare a System Security Plan (SSP) specifically for control CA.L2-3.12.4 under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2, and how to assemble the evidence, artifacts, and assessor checklists the assessor will expect — with practical, small-business friendly guidance you can implement today.

Understand the control and what assessors will look for

Control CA.L2-3.12.4 is in the Security Assessment family; assessors are focused on whether your organization performs security control assessments (scheduled or ad-hoc), documents results, and tracks corrective actions to closure or acceptable risk. In practice, the assessor wants to see a documented assessment approach in the SSP, recent assessment results, evidence that findings are triaged and remediated (or accepted with justification), and where applicable, supporting artifacts such as scan output, test scripts, and signed reports.

What to include in your SSP for CA.L2-3.12.4

Your SSP must describe the assessment strategy and supply pointers to evidence. Key SSP sections to write or update: system boundary diagram, inventory of components in scope (hostname/IP, OS, function), roles and responsibilities (who is the assessment owner, CISO/SME, system admin), assessment frequency and methods (vulnerability scans monthly, annual full-control assessment), tools used (e.g., Nessus, OpenVAS, SCAP, SIEM), and the process for producing and tracking Plan of Actions and Milestones (POA&M) or remediation tickets. Include links or references to the assessment plan document and the most recent assessment report(s).

Essential artifacts and evidence to attach or reference

Compile artifacts so an assessor can validate the SSP claims quickly: (1) Assessment plan (scope, objectives, test cases, assessor name); (2) Most recent assessment report (PDF with signatures or emailed acceptance); (3) Vulnerability scan exports (CSV/HTML) with timestamps and CVE counts; (4) POA&M entries or ticketing system items showing remediation owner, target date, and status; (5) Configuration baseline snapshots (CIS benchmark reports or automated configuration management output); (6) Change control approvals for remediation changes; and (7) Monthly/quarterly monitoring reports from your SIEM or endpoint detection platform showing corrective action verification. Name files with a consistent pattern: [ORG]-[SYSTEM]-[TYPE]-YYYYMMDD (for example: acme-intranet-vulnscan-20260215.csv).

Technical evidence details — how to collect it

For small businesses with limited tools, you can produce valid technical evidence without enterprise toolsets. Use a vulnerability scanner (Nessus Home/Pro, OpenVAS) and export the raw CSV and annotated PDF; run baseline configuration checks with open-source tools (Lynis, CIS-CAT Lite) and capture the full report. Save screenshots of test execution and timestamps from the scanner and store the scanner config file (e.g., Nessus policy XML) so the assessor can see what was tested. For proof of remediation, include the before/after configuration file diff, ticket closure notes in Jira/Trello, and a re-scan report showing the CVE no longer present. Hash (SHA256) the artifact files and record the hashes in an index to prove artifact integrity.

Checklist for assessor readiness — practical items to verify

Create a short assessor checklist and attach it to the SSP. Items should include: 1) SSP updated to current date and lists assessment tools and owners; 2) Latest assessment report uploaded and signed/emailed approval on record; 3) POA&M entries created for all findings with owners and dates; 4) Evidence of remediation/mitigation (ticket, commits, config diffs, re-scan); 5) Evidence retention (where artifact is stored and retention policy); 6) Evidence is timestamped and hashed; 7) If external assessors are used, contract/statement of work and assessor credentials. A one-page index linking each SSP control statement to corresponding artifact filenames reduces assessor friction immensely.

Real-world small-business example

Example: a 25-person engineering firm handling CUI on an internal project server. Their SSP states they perform monthly authenticated Nessus scans and an annual control assessment. Evidence bundle includes: monthly Nessus CSV exports, a CSV-to-PDF annotated report for the annual assessment signed by the security lead, a POA&M maintained in Trello with cards for each vulnerability (owner, priority, resolution date), and a re-scan report proving fixes. For configuration evidence, they store Ansible playbook logs showing a remediation change and the commit hash that changed the configuration. During assessment, the assessor can map the SSP statement -> Nessus exports -> Trello card -> Ansible commit -> re-scan, showing a clear remediation chain.

Risks of not implementing CA.L2-3.12.4 properly and best practices

Failing to implement or document assessment activities exposes your organization to several risks: undiscovered vulnerabilities leading to breach, loss of eligibility for DoD contracts, failed CMMC assessments, and legal/financial exposure if CUI is exfiltrated. Best practices to minimize risk: automate evidence collection where possible, retain raw output and annotated reports, timestamp and hash artifacts, document exceptions and risk acceptances in POA&M, and run at least quarterly basic scans even if your formal assessment cadence is annual. For small businesses, designate a single evidence owner to ensure artifacts are organized and accessible during the assessment window.

Summary: To prepare an SSP for CA.L2-3.12.4, be explicit in the SSP about assessment scope, methods, frequency, and owners; assemble an evidence bundle that includes assessment plans, raw and annotated scan outputs, POA&M entries, and remediation proof; use consistent file naming and hashing; and create a short assessor checklist mapping SSP statements to artifacts. These practical steps reduce assessor effort, speed the assessment, and lower your compliance and security risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes