Agency|Insights
Trust BuildingCompliance Operations

What Is a System Security Plan (SSP)? Structure, Sections, and Best Practices

Learn what a System Security Plan is, its required sections, and why it is foundational for CMMC and FedRAMP assessments. Covers system boundaries, data flows, control implementations, and maintenance best practices.

Agency Team
Agency Team
·10 min read
Typographic card for What Is a System Security Plan (SSP)? Structure, Sections, and Best Practices in Compliance Operations

In our experience, the System Security Plan is where most compliance programs either succeed or fail. Organizations that invest in a thorough, accurate SSP find that the rest of their compliance activities — assessments, audits, continuous monitoring — flow naturally. Those that treat the SSP as a paperwork exercise inevitably face painful assessment findings.

A System Security Plan (SSP) is the foundational document of any compliance program built on NIST standards. It provides a comprehensive description of an information system — its boundaries, components, data flows, users, and interconnections — along with detailed explanations of how the organization implements each required security control. For defense contractors subject to NIST 800-171 and CMMC, the SSP is the single most important compliance artifact. For FedRAMP cloud service providers, it forms the core of the security authorization package. And for organizations subject to FISMA, it is the basis for their Authority to Operate.

This guide explains what an SSP contains, why each section matters, how assessors use it during evaluations, and best practices for creating and maintaining an SSP that accurately reflects your security posture.

Why the SSP Matters

The SSP serves multiple critical purposes beyond simply satisfying a documentation requirement.

Assessment Foundation

For CMMC Level 2 and Level 3 assessments, the SSP is the starting point for every assessor. Before they examine any technical evidence, assessors read the SSP to understand your environment — what systems are in scope, how data flows through them, and how you claim to implement each control. If the SSP is incomplete, inaccurate, or vague, the assessment starts with a credibility deficit that is difficult to overcome.

Operational Reference

A well-maintained SSP serves as the authoritative reference for how security controls operate in your environment. When a new team member needs to understand the access control process, when an incident responder needs to know which systems process CUI, or when a system administrator needs to verify logging requirements, the SSP provides the answer.

Regulatory Requirement

The SSP is explicitly required by:

  • NIST 800-171 — Requirement 3.12.4: "Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems"
  • CMMC — Assessed as part of the Security Assessment (CA) domain
  • FedRAMP — Core component of the security authorization package
  • FISMA — Required for all federal information systems and the basis for ATO decisions

For a comprehensive guide to NIST 800-171 controls, see our NIST 800-171 compliance guide.

Key Sections of a System Security Plan

While the exact structure varies depending on the framework and template used, every SSP should contain the following major sections.

System Identification and Overview

This section introduces the information system and provides context for everything that follows.

ElementDescriptionExample
System nameOfficial name of the information system"CUI Processing Environment"
System identifierUnique identifier for tracking"CPE-001"
System ownerIndividual with authority over the systemChief Information Officer
ISSOInformation System Security OfficerDirector of Security
Operational statusCurrent lifecycle phaseOperational
System descriptionNarrative overview of system purpose and functions"Cloud-based engineering environment used to process, store, and transmit CUI under DoD contracts..."
Information typesCategories of information processedCUI — Controlled Technical Information, CUI — Export Controlled

System Boundary

The system boundary definition is arguably the most critical section of the SSP because it determines the scope of your compliance obligations. Everything inside the boundary must comply with the applicable security controls. Everything outside the boundary is excluded.

A well-defined system boundary includes:

  • Hardware inventory — Servers, workstations, laptops, network devices, mobile devices within the boundary
  • Software inventory — Operating systems, applications, middleware, databases, and cloud services within scope
  • Network boundary — IP address ranges, VLANs, cloud VPCs, and network segments that comprise the system
  • Cloud services — Specific cloud provider accounts, subscriptions, and services included in the boundary (e.g., "AWS Account 123456789012, us-east-1 region, EC2, S3, RDS, and Lambda services")
  • Physical locations — Offices, data centers, and remote work locations where system components operate

What to Include vs Exclude

Defining the boundary requires balancing completeness with practicality. What we tell clients:

Include in the boundary:

  • Any system that processes, stores, or transmits CUI
  • Systems that provide security protections for CUI systems (e.g., a SIEM that monitors CUI systems)
  • Network segments that carry CUI traffic
  • Endpoints used to access CUI systems

Exclude from the boundary (with justification):

  • Corporate systems that never touch CUI (HR systems, marketing tools) if properly segmented
  • Guest WiFi networks with no access to CUI systems
  • Development environments that use only synthetic data

The key is documentation. If a system is excluded from the boundary, the SSP should explain why and describe the controls that prevent CUI from reaching that system.

Data Flow Diagrams

Data flow diagrams visually represent how information moves through the system. Assessors use these diagrams to verify that all data paths are protected and that CUI does not flow to unprotected systems.

Effective data flow diagrams show:

  • Data sources — Where CUI enters the system (email from DoD, file transfers, API integrations)
  • Processing nodes — Systems that transform or process CUI
  • Storage locations — Databases, file shares, cloud storage where CUI resides at rest
  • Transmission paths — Network connections, encrypted tunnels, API calls between components
  • Data exits — How CUI leaves the system (deliverables to the government, transfers to subcontractors)
  • Encryption status — Whether each transmission path and storage location uses encryption

Network Architecture Diagrams

Network architecture diagrams complement data flow diagrams by showing the technical infrastructure:

  • Network topology — Subnets, VLANs, VPCs, and their interconnections
  • Security boundaries — Firewalls, security groups, network access control lists
  • External connections — Internet gateways, VPN concentrators, dedicated links to partners
  • Security appliances — IDS/IPS, web application firewalls, proxy servers
  • Management networks — Separate management planes for infrastructure administration

Authorization Boundary Diagram

The authorization boundary diagram combines elements of data flow and network diagrams into a single view that clearly delineates what is inside and outside the system boundary. This diagram is particularly important for FedRAMP authorizations where the boundary between the CSP's responsibilities and the customer's responsibilities must be unambiguous.

Control Implementation Descriptions

The control implementation section is the largest portion of the SSP, typically consuming 60-70% of the document. For each required control, the SSP must describe:

  • How the control is implemented — Specific, detailed description of the implementation, not a restatement of the control requirement
  • Who is responsible — Roles responsible for implementing and maintaining the control
  • What tools or technologies are used — Specific products, configurations, and settings
  • Implementation status — Fully implemented, partially implemented, planned, or not applicable
  • Shared responsibility — For cloud environments, which aspects the cloud provider handles versus the organization

Writing Effective Control Descriptions

Poor control implementation descriptions are the most common SSP weakness we see. Here is the difference between a weak and strong description:

Weak (restates the requirement):

"The organization employs multi-factor authentication for network access to privileged accounts."

Strong (describes actual implementation):

"All privileged accounts (domain administrators, database administrators, cloud infrastructure administrators) are required to authenticate using Okta MFA with phishing-resistant FIDO2 hardware security keys. MFA is enforced through Okta conditional access policies that block authentication attempts without a second factor. The policy (Policy ID: MFA-PRIV-001) is configured to require MFA for every authentication event, with no trusted device exceptions for privileged accounts. Compliance is monitored through weekly Okta admin reports reviewed by the ISSO, with non-compliant accounts disabled within 24 hours of detection."

The strong description tells the assessor exactly what is deployed, how it is configured, and how compliance is monitored. This level of detail enables the assessor to verify the implementation rather than simply accepting a vague claim.

Roles and Responsibilities

This section defines the security roles within the organization and their responsibilities relative to the information system:

  • System Owner — Authority over the system, accountable for risk acceptance decisions
  • ISSO (Information System Security Officer) — Day-to-day security management, SSP maintenance, POA&M tracking
  • ISSM (Information System Security Manager) — Oversight of the security program, policy enforcement
  • System Administrator — Technical implementation and maintenance of system components
  • Users — Employees and contractors who use the system, their security responsibilities
  • Authorizing Official — Individual who accepts the risk of operating the system (primarily in federal and FedRAMP contexts)

Interconnections

The interconnections section documents all connections between your system and external systems. For each interconnection:

FieldDescription
Connected system nameName of the external system
Connected system ownerOrganization that owns the external system
Connection typeVPN, API, SFTP, dedicated circuit, internet
Data exchangedWhat information crosses the boundary
Security protectionsEncryption, authentication, access controls on the connection
Agreement typeInterconnection Security Agreement (ISA), MOU, or contractual agreement

Continuous Monitoring Strategy

The SSP should describe how the organization maintains ongoing awareness of its security posture:

  • Vulnerability scanning — Frequency, tools, scope, and remediation timelines
  • Configuration monitoring — How baseline configurations are verified and drift detected
  • Log monitoring — What events are logged, how logs are reviewed, and alerting thresholds
  • Access review — Frequency and process for reviewing user access rights
  • Assessment schedule — Planned self-assessments and third-party assessments

Framework-Specific SSP Requirements

NIST 800-171 / CMMC SSP

For CMMC assessments, the SSP must address all 110 NIST 800-171 controls across 14 families. The DoD provides an SSP template (NIST SP 800-171A Appendix D) that many organizations use as a starting point. Key CMMC-specific considerations:

  • Every control must have a detailed implementation description, not just "implemented" or "not implemented"
  • The SSP must clearly define the CUI boundary and how CUI is identified and marked
  • Controls that are not fully implemented must have corresponding entries in the POA&M
  • The SSP must be version-controlled with evidence of periodic review

For complete CMMC requirements, see our CMMC requirements guide.

FedRAMP SSP

FedRAMP SSPs are based on the NIST 800-53 control catalog and follow a specific template provided by the FedRAMP PMO. The FedRAMP SSP is significantly more detailed than a NIST 800-171 SSP because:

  • It must address a larger number of controls (156 for Low, 325 for Moderate, 421 for High)
  • It requires detailed descriptions of the shared responsibility model between CSP and customer
  • It must include a complete inventory of all system components with their security configurations
  • The authorization boundary must clearly delineate the CSP's responsibility from customer responsibilities

RMF / FISMA SSP

For federal information systems governed by the Risk Management Framework, the SSP follows NIST 800-18 guidelines and supports the Authorization to Operate (ATO) process. The RMF SSP is the most detailed variant, requiring:

  • System categorization per FIPS 199
  • Control selection from NIST 800-53 based on categorization
  • Detailed implementation descriptions for all selected controls
  • Risk assessment integration
  • Continuous monitoring strategy aligned with NIST 800-137

SSP Maintenance Best Practices

An SSP is only valuable if it accurately reflects the current state of the system. Stale SSPs are worse than no SSP because they create a false sense of compliance.

Triggers for SSP Updates

Update the SSP when any of the following occur:

  • System changes — New hardware, software, cloud services, or network segments added or removed
  • Control changes — New security tools deployed, existing tools reconfigured, processes modified
  • Organizational changes — New roles, responsibilities reassigned, personnel changes in key security positions
  • Boundary changes — Systems added to or removed from the compliance boundary
  • Regulatory changes — New requirements, updated framework versions, or changed compliance obligations
  • Assessment findings — Assessor recommendations or findings that require SSP modifications
  • Scheduled review — At minimum, annual comprehensive review regardless of changes

Version Control

Maintain strict version control for the SSP:

  • Use a document management system or version-controlled repository (not loose files on a shared drive)
  • Record the date, author, and description of every change
  • Maintain a revision history table at the beginning of the document
  • Require formal approval for substantive changes
  • Keep previous versions accessible for audit trail purposes

Review Process

Establish a regular review cadence:

  • Monthly: ISSO reviews for accuracy against recent changes
  • Quarterly: Control owners verify their respective sections
  • Annually: Comprehensive review with formal re-approval by the System Owner
  • Event-driven: Immediate review after significant incidents, major system changes, or assessment findings

Common SSP Mistakes

Copying template language verbatim. Assessors can immediately tell when control descriptions are copied from a template rather than describing your actual implementation. Every description should be specific to your environment.

Undefined or overly broad boundaries. An SSP that defines the boundary as "the entire corporate network" creates unnecessary compliance scope. Conversely, an SSP that excludes systems that clearly handle CUI will face assessment challenges.

Missing interconnections. Organizations frequently forget to document connections to SaaS platforms, cloud services, or partner systems that handle CUI. If CUI flows through it, it needs to be in the SSP.

Stale content. An SSP that describes last year's infrastructure while current systems have changed significantly undermines credibility. Assessors check for consistency between the SSP and the actual environment.

Inconsistency with other documents. The SSP, POA&M, and risk assessment must be internally consistent. If the SSP says a control is fully implemented, there should not be a POA&M entry for the same control.

Frequently Asked Questions

Agency Team

Agency Team

Agency Insights

Expert guidance on cybersecurity compliance from Agency's advisory team.

LinkedIn

Related Reading

Stay ahead of compliance

Expert insights on cybersecurity compliance delivered to your inbox.

We respect your privacy. Unsubscribe anytime.