Writing control implementation statements is the most time-consuming part of the FedRAMP authorization process. Each of the 325 controls in the Moderate baseline needs a written description of exactly how your organization implements that control — specific enough that a 3PAO assessor can verify it against evidence. The FedRAMP PMO reviews hundreds of SSPs per year. They know within two paragraphs whether a system is genuinely compliant or whether someone filled in a template with plausible-sounding text.
What the SSP Actually Is
The SSP is not a policy document. Policies describe what you intend to do. The SSP describes what you actually do — the specific systems, configurations, tools, and processes that implement each NIST 800-53 Rev 5 control. Auditors reject SSPs that reference policies instead of describing implementations.
The Sections Auditors Scrutinize First
Section 2 — System Categorization
FIPS 199 categorization: Confidentiality, Integrity, and Availability at Low, Moderate, or High. Most commercial SaaS products land at Moderate. Justify each impact level using the information types from NIST SP 800-60. Don't understate — if auditors find the categorization wrong, the entire authorization is invalid.
Section 3 — System Overview
Two to four paragraphs describing what the system does, who uses it, and how it works. Write for a technical auditor who has never seen your product. Name the cloud provider, the deployment model, the services used. No marketing language.
Section 8 — Information System Connections
Every system that connects to your authorization boundary needs to be listed — every API integration, every third-party service, every data feed. Undocumented interconnections appear in 90% of first submissions. Document everything, including read-only connections.
Section 9 — Controls
The bulk of the document. 325 controls for the Moderate baseline, each requiring a Control Implementation Statement.
How to Write Control Implementation Statements That Pass
Each statement needs to answer four questions: What is implemented? How is it implemented? Who is responsible? Where does it apply?
AC-2: The organization manages information system accounts. User accounts are provisioned according to least privilege principles and reviewed periodically.
AC-2: User accounts are managed in Okta (Identity Provider). Account provisioning requires a manager-approved ticket in Jira (project: IT-ACCESS) before accounts are created. New accounts are provisioned with the minimum role required for job function per the access matrix maintained in Confluence. Account reviews are conducted quarterly using an automated Okta report reviewed by the ISSO. Service accounts are tracked in the service account register in GitHub. Accounts are deprovisioned within 24 hours of separation via the offboarding workflow in ServiceNow. The System Owner is responsible for approving all account actions.
The second version names the tools, the process, the responsible party, and the review cadence. An assessor can verify every claim against evidence.
Inherited Controls: Where Most SSPs Get It Wrong
If you're on AWS GovCloud, Azure Government, or GCP (all FedRAMP authorized), a significant portion of controls are inherited. You have to document the inheritance correctly or every inherited control becomes a finding.
- For each inherited control: state that it's inherited from the CSP, reference the CSP's FedRAMP package (authorization number and date), and describe what the CSP provides vs. what you're responsible for
- Many controls are shared — partially inherited, partially customer-implemented. Document both layers
- Get the Customer Responsibility Matrix (CRM) from your CSP first. Build your SSP around it
AWS manages the underlying infrastructure accounts, but you manage the application-layer accounts. For AC-2, both layers need to be described in the control statement.
The POA&M Is Part of the SSP
Any control you can't fully implement by assessment goes on the Plan of Action & Milestones. The POA&M is not a list of failures — it's a documented, managed remediation plan. Having items on the POA&M at initial authorization is normal. Document each item before your assessment with a timeline:
- Critical findings: 30 days
- High: 90 days
- Moderate: 180 days
- Low: 365 days
5 Reasons SSPs Fail JAB Review
-
FAIL 1
System boundary is undefined If auditors can't determine what's in scope and what isn't, the entire SSP is invalid. Draw a clean boundary. Document every component inside it. Your network diagram must match what you describe in Section 3.
-
FAIL 2
Controls marked Implemented with no specifics "Implemented" in the SSP creates an expectation that the 3PAO will find evidence of implementation. If the evidence isn't there, you have a finding — and a finding discovered during assessment is worse than one in the POA&M.
-
FAIL 3
Organization-defined parameters left blank NIST 800-53 controls have parameters FedRAMP sets specific values for. If you leave them as "[organization-defined]", the reviewer sends it back. Fill in every parameter per the FedRAMP baseline document.
-
FAIL 4
Diagrams don't match the text If the text says you use a WAF but the architecture diagram doesn't show one, that's a finding. If a data flow shows encryption but the text doesn't mention it, auditors will question whether it's actually implemented.
-
FAIL 5
Missing controls Every control in the FedRAMP Moderate baseline must be addressed — Implemented, Inherited, Planned, or Not Applicable with documented justification. Missing controls are automatic rejections.
Realistic Timeline
That assumes dedicated staff who know what they're doing. Most engineering teams don't. The usual path is hiring a compliance consultant at $150–300/hour or a GRC platform at $50K–200K/year.
Related reading: SOC 2 gap analysis — domain-by-domain checklist
SSP drafting without the six-figure consulting bill.
The Federal Compliance Pack's SSP drafter agent generates control implementation statements from your system description — NIST 800-53 Rev 5 for FedRAMP Moderate and High, with inheritance analysis against AWS, Azure, and GCP packages. Monthly ConMon reports, POA&M lifecycle management, and ATO tracking included.