SSP

System Security Plan (SSP) Template for Small Defense Contractors

11 min read · Published May 17, 2026 · Updated May 17, 2026

Short answer: A System Security Plan (SSP) is the foundational document that describes your in-scope systems, the boundary around your CUI, and how each of the 110 NIST 800-171 controls is implemented in your environment. For a small contractor it's typically 40–120 pages and structured by control family. Without an SSP, you have nothing to self-assess against and no C3PAO will start an engagement.

What an SSP is for

The SSP is the single source of truth that defines what's in scope for CMMC, who is responsible, and how each control is implemented or inherited from a cloud provider. It anchors your SPRS score, your POA&M, and the C3PAO assessment plan. Treat it as a living document — update it whenever your boundary, tooling, or vendors change.

Section-by-section outline

  1. System identification — name, CAGE codes, locations, points of contact
  2. System purpose & operating environment — what the system does, who uses it
  3. System boundary — diagram + narrative defining what is in / out of scope
  4. Data flow — how CUI enters, moves, and exits the boundary
  5. Interconnections — every external system the boundary touches, with the type of data
  6. Shared responsibility — which controls are inherited (e.g. AWS GovCloud) vs implemented by you
  7. Control narratives — one per the 110 controls, organized by family
  8. Roles & responsibilities — named owners for each control family
  9. Plan maintenance — change-control procedure for the SSP itself
  10. Appendices — network diagram, asset inventory, software list, POA&M reference

The boundary diagram

Every C3PAO will ask for this in the first 5 minutes. It must show: every host, network segment, and SaaS app that stores, processes, or transmits CUI; the inbound and outbound connections; and the trust boundary line. Use a clear visual style — Visio, Lucidchart, or draw.io are all fine. Label each component with its asset ID from your inventory.

Writing control narratives

Every control narrative needs four parts:

  1. What the control requires (paraphrase the NIST statement, do not copy verbatim)
  2. How you implement it (named tool, configuration, person responsible)
  3. Where the evidence lives (file path, ticket queue, vendor portal)
  4. Inheritance if applicable (e.g. "Encryption in transit inherited from AWS GovCloud per CRM v3.2 row 14")

Common SSP errors

  • Copy-pasting NIST control text without describing implementation
  • Boundary diagram missing SaaS apps (Microsoft 365, GitHub, Jira)
  • No data flow showing how CUI enters the system
  • Shared responsibility claims with no CRM citation
  • Outdated screenshots / configurations from before the last network change
  • Owner = "IT department" instead of named individuals
Mentioned in this guide
On the Armory platform

Frequently asked questions

How long should my SSP be?
Length is a symptom, not a goal. A small contractor with a single GovCloud enclave usually lands at 50–80 pages. Anything under 30 is probably too thin; anything over 200 usually means uncontrolled scope.
Can I reuse a template?
Yes — the DoD CIO publishes a template, and several free community templates exist. But every control narrative must reflect your actual implementation, not template placeholder text.
How often do I update it?
On every material change (new SaaS app in scope, vendor swap, network segmentation change) and at minimum annually. Version-control the document and log changes in section 9.
Who writes the SSP?
Usually a security or IT lead with input from each control-family owner. Outside consultants can draft it, but the named owners inside your company must understand and sign off — the C3PAO will interview them.
Related guides
Ready to act?

Run a free NIST 800-171 gap analysis

See where you stand on the 110 controls in under 10 minutes. No card, no consultant.