The CMMC SSP: What Assessors Actually Look For
CMMC READINESS

The CMMC SSP: What Assessors Actually Look For

What C3PAO assessors flag in the first 10 minutes of reviewing your System Security Plan, and what most contractors get wrong.

Leonard EsereApril 16, 2026

The System Security Plan is the single most important document in your CMMC assessment. It is the first thing the C3PAO reviews, the document they reference throughout the assessment, and the artifact most likely to determine whether your assessment starts on solid ground or in a hole. After years at MITRE working on assessment frameworks and preparing contractors for CMMC, I have seen every way an SSP can go wrong. Here is what assessors actually look for and what you need to get right.

What the SSP Actually Is (and Is Not)

The SSP is not a policy document. It is not a marketing brochure for your security program. It is a technical description of your information system, the security controls you have implemented, and how those controls satisfy each of the 110 NIST SP 800-171 practices required for CMMC Level 2.

Think of the SSP as a map of your security implementation. An assessor should be able to read your SSP and understand: what systems are in scope, how CUI flows through those systems, what controls protect CUI at each point, and who is responsible for maintaining those controls. If your SSP does not answer those questions clearly, the assessment is going to be painful.

What Assessors Flag in the First 10 Minutes

C3PAO assessors are experienced professionals who have reviewed hundreds of SSPs. They develop pattern recognition for quality and for problems. Here is what they check first:

The Assessor's First 10 Minutes

1

System Boundary Definition

Is the boundary clearly defined? Does it include all systems that process, store, or transmit CUI? Are external connections identified? A vague or incomplete boundary is the number one red flag because it means the entire scope of the assessment is uncertain.

2

Network Diagram Accuracy

Does the network diagram match the system description? Are all subnets, firewalls, and external connections shown? Assessors will compare your diagram to scan results and configuration exports. Discrepancies trigger deeper investigation.

3

CUI Data Flow

How does CUI enter the system? Where is it stored? How is it transmitted? Who accesses it? How is it disposed of? If the SSP cannot trace CUI through its lifecycle, the assessor cannot verify that controls protect it at every stage.

4

Control Implementation Descriptions

Are the control descriptions specific to your environment or generic boilerplate? Assessors can spot template language immediately. They want to see descriptions that reference your actual systems, tools, and configurations by name.

5

Revision History and Currency

When was the SSP last updated? Is there a revision history showing regular reviews? An SSP last updated 18 months ago tells the assessor that your documentation practice is weak, which makes them question everything else.

How to Structure the System Boundary

The system boundary is the foundation of your SSP and the scope of your CMMC assessment. Get it wrong and everything built on top of it is unstable. Here is how to define it correctly:

System Boundary Components

Must Include

  • • All endpoints that access CUI
  • • Servers that store or process CUI
  • • Network infrastructure connecting CUI systems
  • • Security tools protecting CUI systems
  • • Cloud services used for CUI (GCC High, etc.)
  • • Mobile devices with CUI access
  • • Backup systems containing CUI
  • • Personnel with CUI access (by role)

Can Exclude (If Properly Segmented)

  • • Corporate IT systems with no CUI access
  • • Guest wireless networks
  • • Personal devices (if BYOD is prohibited for CUI)
  • • Development/test environments (if no CUI)
  • • HR and finance systems (if no CUI)
  • • Marketing and sales platforms
  • • Public-facing web servers (if no CUI)

The key principle is minimization. The smaller your boundary, the fewer systems you need to protect at CMMC Level 2, and the less expensive and complex your implementation becomes. This is why CUI enclaves are so popular: they create a well-defined, tightly controlled boundary that keeps the assessment scope manageable.

Common SSP Failure Modes

Based on my experience at MITRE and working with contractors, these are the SSP problems that cause the most assessment failures:

Failure Mode 1: The Copy-Paste SSP

The SSP was generated from a template or copied from another organization. Control descriptions are generic. System names do not match the actual environment. The network diagram looks like it came from a textbook rather than a real network.

Fix:

Every control description must reference your specific systems, tools, and configurations. Replace "the organization uses multi-factor authentication" with "AcmeCorp enforces MFA via Azure AD Conditional Access Policy CA-001, requiring Microsoft Authenticator for all users accessing the CUI enclave."

Failure Mode 2: The Boundary Creep

The SSP defines a CUI enclave, but in practice CUI has leaked outside the boundary. Users forward CUI via personal email. CUI is stored on a shared drive outside the enclave. A contractor accesses CUI from an unmanaged device.

Fix:

Implement technical controls that enforce the boundary, not just policies that describe it. DLP rules, conditional access policies, and network segmentation should make it technically difficult to move CUI outside the boundary.

Failure Mode 3: The Stale SSP

The SSP was written during initial implementation and never updated. The environment has changed significantly: new systems added, old systems decommissioned, cloud migration completed, staff turnover. The SSP describes a system that no longer exists.

Fix:

Establish a quarterly SSP review process. Any significant change to the environment (new system, decommissioned system, architecture change, tool replacement) should trigger an SSP update within 30 days.

Failure Mode 4: The SSP-POA&M Disconnect

The SSP says a control is fully implemented, but the POA&M lists the same control as having a deficiency. Or the SSP acknowledges a gap but there is no corresponding POA&M entry. These inconsistencies tell the assessor that nobody is maintaining these documents as a coherent set.

Fix:

The SSP and POA&M must be maintained together. Every control marked as partially implemented in the SSP must have a corresponding POA&M entry. Every closed POA&M item must be reflected as fully implemented in the SSP.

The SSP and POA&M Relationship

The SSP and POA&M are companion documents. The SSP describes your current security posture. The POA&M describes the gaps between your current posture and full compliance, along with your plan to close those gaps. Together, they give the assessor a complete picture of where you are and where you are going.

SSP + POA&M Alignment

📄

SSP Says "Implemented"

Control is fully in place. Evidence must support this claim. No POA&M entry needed.

📝

SSP Says "Partially Implemented"

Control has gaps. POA&M must document the gap, root cause, remediation plan, and target date.

📋

SSP Says "Planned"

Control is not yet implemented. POA&M must have a credible implementation plan with milestones.

SSP Sections That Matter Most

While every section of the SSP matters, assessors spend disproportionate time on these areas:

High-Scrutiny SSP Sections

SectionWhy It MattersScrutiny Level
System BoundaryDefines the entire assessment scopeCritical
Network ArchitectureValidates boundary and data flow claimsCritical
CUI Data FlowShows where controls must be appliedCritical
Control ImplementationsCore of the assessment evaluationHigh
Roles and ResponsibilitiesDrives interview selectionHigh
InterconnectionsExternal system risks and controlsMedium

Writing Control Descriptions That Pass

The control implementation description is where most SSPs fail. Here is the formula that works:

The Four-Part Control Description

  1. What: State what the control does in your environment, referencing specific systems and tools.
  2. How: Describe the technical implementation, including configuration details.
  3. Who: Identify the role responsible for maintaining the control.
  4. Evidence: Reference where the assessor can find proof of implementation.
Example: AC.L2-3.1.1 (Authorized Access Control)

What: Access to the AcmeCorp CUI Enclave is restricted to authorized users who have completed CUI awareness training and have been approved by the Information System Security Officer (ISSO).

How: Azure Active Directory Conditional Access Policy CA-001 enforces that only members of the "CUI-Authorized-Users" security group can access enclave resources. Group membership requires ISSO approval via ServiceNow request RITM-CUI-ACCESS. MFA via Microsoft Authenticator is required for all enclave access. Device compliance (Intune-managed, encrypted, current patches) is enforced via Conditional Access Policy CA-002.

Who: The ISSO (Jane Smith) manages group membership. The IT Security team manages Conditional Access policies. HR triggers access removal upon termination.

Evidence: Conditional Access policy export (AC.L2-3.1.1_CA-policy-export.json), Azure AD group membership report (AC.L2-3.1.1_group-membership.csv), sample access request workflow (AC.L2-3.1.1_access-request-sample.pdf).

The Bottom Line

Your SSP is not a document you write once and file away. It is a living description of your security implementation that must stay current, accurate, and specific. The contractors who pass their CMMC assessments on the first attempt are the ones whose SSPs read like an operator's manual for their security program, not like a compliance template with the blanks filled in.

Need Help Building a C3PAO-Ready SSP?

AeoliTech generates SSPs from your actual implementation state, not from templates. Every control description references your real systems and configurations.

Schedule a CMMC Readiness Call
LE

Leonard Esere

Founder & CEO, AeoliTech

Leonard's experience at MITRE working on assessment frameworks and security architecture gives him deep insight into what C3PAO assessors look for and how contractors can prepare SSPs that withstand scrutiny.