The 7 Documents That Every CMMC Auditor Will Ask For
If you're preparing for a CMMC Level 2 certification assessment (the most common level for contractors handling Controlled Unclassified Information, or CUI), documentation is everything. C3PAO assessors don't just take your word for it—they want to see clear, finalized, auditable evidence that your cybersecurity program is documented, implemented, and operating effectively.
Drafts, working papers, or "we'll update that later" responses won't cut it. Assessors expect mature, approved documents.
While every assessment is unique and evidence requirements span all 110 NIST SP 800-171 controls (and their 320+ assessment objectives), certain core documents almost always rise to the top of the auditor's request list early in the process.
Here are the 7 documents every CMMC auditor is likely to ask for:
1. System Security Plan (SSP)
This is the single most important document in your entire CMMC package.
The SSP serves as the master blueprint of your CUI environment. It describes:
- Your system boundary and asset categorization (CUI assets, Security Protection Assets, etc.)
- How you implement each of the 110 security requirements
- Roles and responsibilities
- System interconnections and data flows
Tip: Use the official NIST SSP template as a starting point, then customize it heavily to reflect your actual environment. Assessors will reference your SSP constantly throughout the assessment to understand your controls before diving into technical testing.
Without a comprehensive, up-to-date SSP, the rest of your evidence becomes much harder to contextualize.
2. Plan of Action and Milestones (POA&M)
No organization is perfect. The POA&M is your formal roadmap for addressing any gaps or deficiencies identified during your internal gap analysis or self-assessment.
It should include:
- Specific weaknesses or unmet assessment objectives
- Remediation steps
- Responsible parties
- Target completion dates
- Current status
Assessors review the POA&M to understand your risk posture and remediation maturity. For CMMC Level 2 certification assessments, significant open items can delay or prevent certification.
3. Comprehensive Security Policies and Procedures
CMMC requires documented policies (the "what" and "why") and procedures (the "how") across the 14 control families.
Common policies auditors request include:
- Access Control Policy
- Configuration Management Policy
- Incident Response Policy and Procedures
- Risk Assessment / Management Policy
- Awareness and Training Policy
- Audit and Accountability (Logging & Monitoring) Policy
- Physical and Personnel Security Policies
Many organizations maintain a set of high-level policies (one per domain) plus detailed supporting procedures. These must be finalized, version-controlled, approved, and actively followed—not just written for the audit.
4. Network Diagrams and System Architecture Documentation
Visual representations of your environment are critical for scoping and boundary verification.
Expect to provide:
- Detailed network diagrams showing segmentation between CUI and non-CUI environments
- Data flow diagrams illustrating how CUI enters, moves through, and exits your systems
- System inventory and boundary descriptions
These diagrams help assessors quickly understand your environment and verify that controls like boundary protection and media protection are properly implemented.
5. CUI Data Flow Diagrams and Asset Inventory
Closely related to network diagrams, these documents specifically map Controlled Unclassified Information—where it resides, how it flows, and who can access it.
Auditors will want to see:
- Clear identification of CUI assets
- Information flow paths (including external service providers)
- Asset categorization (CUI Assets, Security Protection Assets, Contractor Risk Managed Assets)
Accurate scoping is one of the biggest challenges in CMMC assessments. Strong data flow and asset documentation makes this process far smoother.
6. Training Records and Security Awareness Materials
CMMC requires ongoing security awareness training and role-based training for personnel with security responsibilities.
Auditors typically request:
- Security awareness training materials (presentations, modules, acknowledgments)
- Training completion records and attendance logs (often for the past 12 months)
- Evidence of specialized training for privileged users or incident responders
These records demonstrate that your people—not just your technology—understand and follow your security program.
7. Evidence of Control Implementation (Artifact Package)
This isn't a single document but a well-organized collection of supporting evidence mapped to the controls. It often includes:
- Configuration screenshots or exports
- Access control lists and review records
- Vulnerability scan reports and remediation evidence
- Audit logs and monitoring reports
- Incident response test results
- Change control records
- Backup and recovery test documentation
Many organizations compile this into a structured evidence matrix or folder system cross-referenced to the SSP and assessment objectives. Tools and templates (including the Virtual Assessment Evidence Preparation Template) can help organize this.
Pro Tips for CMMC Documentation Success
- Final form only: Drafts and unofficial documents are explicitly not acceptable as evidence.
- Version control and approvals: Every major document should show approval dates, version numbers, and review history.
- Map everything: Create a traceability matrix linking your evidence to specific NIST SP 800-171 controls and assessment objectives.
- Keep it current: Documentation must reflect your actual operating environment, not an idealized or outdated state.
- Start early: Building these 7 document categories typically takes months, not weeks.
Bottom line: Strong documentation doesn't just help you pass a CMMC assessment—it proves your organization has a mature, repeatable cybersecurity program capable of protecting national security information.
If you're just beginning your CMMC journey, prioritize the System Security Plan and Policies/Procedures first. Everything else builds on that foundation.
Need help building or reviewing your CMMC documentation package? Reach out to us today, and let's turn that compliance stress into a solid "Pass."
What’s the biggest documentation challenge you’re facing in your CMMC preparation? Drop a comment below—I’d love to hear from you.
