FedRAMP SSP Generator
Infracast automatically generates System Security Plans (SSPs) following FedRAMP and NIST 800-171 templates, pulling data directly from live infrastructure discovery and compliance assessments.
Overview
Writing an SSP is one of the most time-consuming parts of a FedRAMP authorization. Infracast eliminates manual narrative writing by generating implementation statements for each control family using real infrastructure data — then packaging everything into a ready-to-submit compliance bundle.
What Gets Generated
System Security Plan Document
- Cover page and metadata — System name, system owner, ISSO, authorization boundary
- System description — Auto-populated from discovered assets and topology
- 18 NIST 800-53 Control Families — Per-control implementation narratives based on your actual configuration
- Control origination — Inherited, system-specific, hybrid (mapped from cloud provider shared responsibility)
- Information types and categorization — FIPS 199 impact levels
Per-Control Implementation Narratives
Infracast generates implementation statements for all 18 NIST 800-53 control families:
| Family | Code | Examples |
|---|---|---|
| Access Control | AC | IAM policies, role assignments, least privilege posture |
| Audit & Accountability | AU | CloudTrail, log retention, monitoring |
| Configuration Management | CM | Baseline configs, drift detection, change control |
| Identification & Authentication | IA | MFA enforcement, password policy, service accounts |
| Incident Response | IR | Alert integrations, SIEM connectivity |
| Risk Assessment | RA | Vulnerability scanning, threat intel correlation |
| System & Communications Protection | SC | Encryption in transit/at rest, network segmentation, DNS security |
| System & Information Integrity | SI | Patch status, malware protection, vulnerability remediation |
| (and 10 more families) |
Narratives reference specific assets, configurations, and evidence artifacts found during discovery — not generic boilerplate.
Compliance Package Export (ZIP)
The exported ZIP contains:
SSP.docx— Full System Security Planasset-inventory.xlsx— Complete node inventory with asset types, IPs, and owner tagsPOA&M.xlsx— Open findings with remediation milestonesarchitecture-diagrams/— System boundary, network zone, and data flow SVG/PNG diagramsevidence-bundle/— Ed25519-signed evidence artifacts for each control
Generating an SSP
- Navigate to Compliance → SSP Generator
- Select your authorization baseline (FedRAMP Low / Moderate / High or NIST 800-171)
- Review pre-populated system metadata (edit any fields as needed)
- Click Generate SSP
- Download the compliance package ZIP when complete (typically 2–5 minutes)
Via API
# Trigger SSP generation
POST /api/v1/ssp/generate
Authorization: Bearer <token>
Content-Type: application/json
{
"baseline": "fedramp-moderate",
"system_name": "My Cloud System",
"system_owner": "Jane Smith",
"isso": "John Doe"
}
# Response:
{
"job_id": "ssp-abc123",
"status": "pending",
"estimated_seconds": 120
}
# Poll for completion
GET /api/v1/ssp/jobs/ssp-abc123
# Download package
GET /api/v1/ssp/jobs/ssp-abc123/download
Supported Baselines
| Baseline | Controls | Use Case |
|---|---|---|
| FedRAMP Low | 125 controls | Low-impact cloud systems |
| FedRAMP Moderate | 325 controls | Most federal cloud systems |
| FedRAMP High | 421 controls | High-impact / sensitive data |
| NIST 800-171 | 110 practices | CUI / CMMC compliance |
Compliance Mapping
The SSP Generator is particularly relevant for:
| Framework | Benefit |
|---|---|
| FedRAMP | ATO package accelerator — SSP is a core authorization artifact |
| CMMC | NIST 800-171 practice implementation statements |
| DISA RMF | System description and control implementation docs |
| NIST 800-53 | Per-control implementation evidence |
Tips for Better SSPs
- Run a full discovery first — The more assets Infracast knows about, the richer the narratives
- Resolve critical findings — Open findings appear in the POA&M section; fewer findings = stronger SSP
- Tag your assets — Owner, environment, and data classification tags improve the asset inventory output
- Review narratives before submitting — AI-generated text is a starting point; review with your ISSO before submission to a 3PAO