🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create an Audit-Ready System Security Plan (SSP) for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - CA.L2-3.12.4: Step-by-Step Template for Boundaries, Environments, and Connections

Step-by-step guidance and a practical template to document system boundaries, operational environments, and external connections in an audit-ready SSP for CMMC 2.0 Level 2 / NIST SP 800-171 rev.2 control CA.L2-3.12.4.

•
April 14, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a step-by-step, audit-ready template for the System Security Plan (SSP) sections required to satisfy CMMC 2.0 Level 2 / NIST SP 800-171 Rev.2 control CA.L2-3.12.4, focusing on documenting system boundaries, environments, and connections in a way that satisfies assessors and supports continuous monitoring for small businesses handling CUI.

What CA.L2-3.12.4 expects (practical interpretation)

At CMMC Level 2 the CA family expects documented, verifiable assessment and oversight of systems that process, store, or transmit Controlled Unclassified Information (CUI). Practically this means your SSP must clearly identify the system boundary (where CUI is in scope), the distinct environments (production, development, test, DR), and all inbound/outbound connections (third-party, remote access, cloud integrations) with associated controls and monitoring. The goal is traceability: an assessor should be able to map each connection and environment to implemented controls, logging, and vulnerability scanning evidence.

Step-by-step SSP template: sections to include

Use the following high-level sections in your SSP for CA.L2-3.12.4. For each section include owner, contact, last updated date, and links to evidence (diagrams, configs, scan results): - System Identification (Name, version, physical locations, CUI types) - System Boundary Diagram (network, cloud, data flows) - Environments (production/test/dev/DR and data handling rules) - External Connections (vendor APIs, cloud endpoints, VPNs, inter-facility links) - Controls Applied to Each Connection/Boundary (firewall rules, encryption, ACLs) - Monitoring and Assessment Plan (vulnerability scan cadence, log retention, SIEM) - Authorization and POA&M status (current authorization, open findings) A small-business example: a 15-person DoD subcontractor might have a single "CUI System" hosted in Azure, a production VNet, a separate dev subscription, and two third-party telemetry connections—each of these must be listed and mapped to controls.

How to build the System Boundary Diagram

Draw a single-page diagram that is readable by auditors and includes: trust zones (CUI zone vs non-CUI), IP ranges (CIDR), VLANs, cloud VNet IDs, firewall/NGFW instances, load balancers, and data flow arrows showing encryption in transit. Example notations: "Prod VNet: 10.10.0.0/16 (CUI in scope)", "Dev VNet: 10.20.0.0/16 (non-CUI; sanitized copies only)", "VPN Gateway: public IP 203.0.113.45 -> tunnel to corporate firewall". Use text boxes to reference the specific evidence files (e.g., Azure Network Security Group rules file: evidence/azure-nsg-prod-2026-03-01.json). Tools: draw.io or Lucidchart exports plus an index of linked evidence stored in your compliance repo.

Documenting Environments and segregation

For each environment state: purpose, data classification allowed, access controls, build/release process, and sanitization policies. Example: "Test environment receives sanitized CUI only via an automated masker (script v1.2, repo link) and is rebuilt nightly using IaC templates (Terraform v1.4) stored in a protected repo with branch protections." Specify CI/CD pipeline controls (least privilege service accounts, artifact signing), and note whether developer machines have access to production. For a small business, minimally keep dev/test in separate accounts/subscriptions and enforce different network ACLs and IAM roles to prevent accidental data exfiltration.

Mapping and securing Connections (external and remote)

List each connection with: purpose, owner, protocol/ports, endpoints, authentication method, encryption (TLS version), firewall policy examples, and monitoring. Example entry: "Third-party analytics API – Owner: IT Ops – Purpose: usage telemetry – Endpoint: api.thirdparty.example.com (198.51.100.22) – Protocol: HTTPS (TLS 1.2+, mTLS optional) – Firewall: allow outbound TCP 443 from 10.10.1.0/24 -> 198.51.100.22; rule ID FW-PROD-OUT-001." Recommended technical controls: enforce TLS 1.2+/1.3, use mutual TLS or OAuth with short-lived tokens for machine-to-machine, restrict source IPs in firewall rules, and use jump/bastion hosts for admin access with MFA and session recording. Document vendor contracts that require security controls and evidence of their security posture (AUP, SOC reports).

Monitoring, assessment evidence, and continuous compliance

Include a Monitoring & Assessment Plan section that lists tools, frequency, owners, and expected outputs: vulnerability scans (monthly, e.g., Nessus/OpenVAS), authenticated scans against in-scope hosts, weekly log aggregation to SIEM (or cloud-native equivalent), daily alerting for critical indicators, and quarterly penetration tests. Attach scan reports, ticket IDs for remedial actions, and POA&M entries with due dates and owners. Evidence examples for small businesses: monthly vulnerability report PDFs, CloudTrail logs retained 1 year, firewall rule export snapshots, and screenshots of IAM role definitions. Define retention policies (logs 1 year; scan results 3 years) to satisfy assessors' expectations for reproducible evidence.

Risk of not implementing this requirement: incomplete or inaccurate boundaries and connection documentation leads to scope creep, missed vulnerabilities, and failed assessments. For a small business this can mean losing DoD contracts, costly remediation under time pressure, and potential CUI exposure. Technical risks include misconfigured NAT/firewall rules accidentally allowing lateral movement, insufficient encryption for a vendor API, or test data containing real CUI—any of which can result in compliance failure and real-world data breaches.

Summary: build your SSP so that boundaries, environments, and connections are explicit, diagrammed, and mapped to implemented controls and evidence. Use the template sections above, include concrete artifacts (network exports, scan reports, IaC templates), automate evidence collection where possible, and schedule regular reassessments. For small businesses, prioritize clear diagrams, strict separation of prod/test, MFA and logged admin access, monthly vulnerability scanning, and a living POA&M—these practical steps will make CA.L2-3.12.4 audits straightforward and reduce operational risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes