🚨 CMMC Phase One started November 10! Here's everything you need to know →

SSP Template and Example: Implementing NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - CA.L2-3.12.4 for Small Businesses

Step-by-step SSP template and practical example to implement NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control CA.L2-3.12.4 (POA&M) specifically tailored for small businesses.

•
April 12, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

CA.L2-3.12.4 requires organizations to develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities; for small businesses this translates into a lightweight, auditable POA&M process documented in the System Security Plan (SSP) and linked to tangible remediation activities and timelines.

Understanding CA.L2-3.12.4 within the Compliance Framework

Within NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2, 3.12.4 (mapped as CA.L2-3.12.4) is the POA&M requirement: have an actionable, maintained plan to fix findings found by assessments, scans, or audits. For a small-business Compliance Framework, this requirement is not just paperwork — it is the operational bridge between identifying risk (vulnerability scans, internal assessments) and reducing it (patches, configuration changes, compensating controls) while providing traceable evidence for assessors and contracting officers.

SSP Template: What to document for CA.L2-3.12.4

Your SSP should contain a short, explicit control implementation statement, the tool(s) used to maintain POA&Ms, the owner/approver roles, update cadence, and linkage to evidence. Required SSP fields for CA.L2-3.12.4 (suggested):

  • Control ID: CA.L2-3.12.4
  • Control Name: Plans of Action and Milestones (POA&M)
  • Implemented (Yes/No/Planned):
  • Implementation Statement: concise operational statement of how POA&Ms are produced/maintained
  • POA&M Tool: e.g., Jira, GitHub Issues, Tenable.io, or a secured spreadsheet
  • Owner: Title (e.g., IT Manager / ISSM)
  • Update Frequency: e.g., weekly for high severity, monthly for others
  • Evidence Locations: links to tickets, patch records, scan results, email approvals

Sample SSP Implementation Statement

"The organization maintains a centralized POA&M in [Tool Name]. Findings from vulnerability scans (Tenable), internal assessments, and third-party audits are entered as POA&M items with assigned owners, priority (based on CVSS and business impact), planned completion dates, required resources, and status. The ISSM reviews POA&M items monthly and approves extensions or risk acceptances. Evidence of remediation is attached to each POA&M item." — include this verbatim in your SSP and replace [Tool Name].

Practical implementation steps for small businesses

Actionable sequence to implement CA.L2-3.12.4: 1) Choose a POA&M tracking mechanism — for very small shops a locked Google Sheet or Excel stored in an encrypted cloud folder is acceptable; for slightly larger shops use Jira/GitHub Issues or a dedicated GRC/VA platform; 2) Define a POA&M template with fields (ID, description, source, CVSS/priority, owner, planned completion, resources, status, evidence link); 3) Integrate intake by automating import of vulnerability scan outputs (Tenable, Qualys, OpenVAS) or by assigning a person to process audit findings; 4) Assign owners, estimate effort, set realistic timelines and get management sign-off for planned completion dates; 5) Track remediation evidence: patch logs, change control records, test results, and update POA&M status; 6) Schedule periodic POA&M reviews with executive summary metrics (open count by severity, overdue items) for the authority having responsibility (AHJ) or contracting officer.

POA&M Example (single entry)

Example POA&M row in your tool: ID: POA-2026-001; Title: "Unpatched Windows RDP vulnerability (CVE-YYYY-NNNN)"; Source: Vulnerability scan (Tenable) 2026-03-15; CVSS: 7.5 (High); Affected System: Finance-AD01; Owner: IT Lead (name/email); Planned Remediation: Apply MS patch KBxxxx, restart server, verify with rescan; Planned Completion: 2026-03-22; Resources Required: 1 hour downtime, backup verified; Status: In Progress; Evidence Link: ticket#/screenshot of patch log; Residual Risk: mitigated by network ACL restricting RDP.

Real-world scenarios for small businesses

Scenario A — Small software development firm (15 employees): They run weekly SAST/DAST and monthly Nessus scans. Process: scan -> triage -> create POA&M ticket in GitHub Issues with label 'POA&M' -> assign developer + deadline -> attach PR/commit ID when fixed -> ISSM closes ticket after verification. This keeps the SSP accurate and demonstrates control implementation to assessors.

Scenario B — Small manufacturer with OT devices: Vulnerability scans identify an unsupported PLC. The business creates a POA&M entry noting the inability to patch, assigns compensating controls (network segmentation, ACLs, monitoring), sets a medium-term mitigation plan (device replacement in 6 months), and documents risk acceptance by leadership. This meets CA.L2-3.12.4 when documented, approved, and reviewed periodically.

Compliance tips, best practices, and technical details

Best practices: map CVSS or internal scoring to POA&M priority (e.g., CVSS ≥ 9 = immediate/7 days), require owner and estimated hours for all items, maintain evidentiary artifacts (patch IDs, change tickets, screenshots) and store them in a tamper-evident location. Automate where possible: ingestion of scanner findings, scripted patch deployments (WSUS/SCCM for Windows, apt/yum automation for Linux) and automatic creation of POA&M tickets for known false positives to reduce noise. Secure your POA&M: restrict edit access, enable MFA, and keep an audit trail. Make POA&M review part of monthly leadership meetings and include metrics in your SSP (e.g., average days-to-remediate, percent overdue).

Risk of not implementing CA.L2-3.12.4

Without a POA&M process you risk lingering, untracked vulnerabilities and weak audit trails — practical impacts include failed CMMC assessments or contract disqualification, increased probability of compromise (data loss, ransomware), and inability to demonstrate remediation to DoD prime contractors. For small businesses, a single unmitigated finding can result in lost contracts, reputational damage, and potential regulatory or contractual penalties.

In summary, CA.L2-3.12.4 is operationally simple but auditorially critical: implement a documented POA&M process in your SSP, pick an appropriate tracking tool, integrate scanner and assessment intake, assign owners and realistic deadlines, collect remediation evidence, and establish a review cadence. For small businesses this approach is scalable, demonstrable, and will substantially reduce both technical risk and compliance exposure.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes