← Back to Assessment ToolSSAE 18 Physical Security · 2026

How It Works

A complete walkthrough of the SSAE 18 Physical Security Assessment Tool — from first login through to an auditor-ready CSV report, aligned to the 2026 AICPA Trust Services Criteria.

The 6-Step Process

1

Enter Organization Info

Start on the Organization Info tab. Enter your organization name, facility location, assessor name, assessment date, and scope. This metadata appears in every CSV export and helps identify assessments in your history.

Tip: Be specific in the scope field — "Main data center, 123 Main St, floors 1–3" is far more useful than "our building."
2

Work Through the Assessment

Navigate the 7 categories in the left sidebar. For each control, set a maturity rating (0–5) across 5 criteria: Implementation, Effectiveness, Documentation, Testing, and Maturity. Add notes for context and paste or type evidence references in the Evidence field.

Tip: Your work auto-saves every second while you type — you can close the tab and return any time without losing progress.
3

Review the Dashboard

The Dashboard tab shows live KPIs — overall completion %, controls assessed, critical findings, and high-priority items. Category compliance bars let you spot weak domains instantly.

Tip: Aim for green (≥90%) on your critical domains before your audit window opens.
4

Work the Remediation Plan

The Remediation Plan tab auto-generates a prioritized list from your ratings. Critical items (avg < 2.0) need 30-day fixes. High priority (2.0–3.4) should be addressed within 60 days. Medium priority (3.5–4.4) within 90 days.

Tip: Use the notes you entered to give your remediation team immediate context — they appear inline on each finding.
5

Save Assessment Snapshots

Click "Save Assessment" to commit the current state to history. Each save records completion %, critical count, and the full data payload. The Dashboard's trend charts are built from these real snapshots — save after each significant work session to build a meaningful trend.

Tip: Snapshots are stored locally in your browser. Export CSV before clearing your browser data.
6

Export CSV for Auditors

Click "Export CSV" to download a spreadsheet containing every control, all 5 criteria ratings, averages, your notes, and evidence references — one row per control, labelled with org name and date. Share this with your auditor or use it to build your evidence package.

Tip: The CSV filename includes your organization name and assessment date automatically.

The 7 Assessment Domains

Each domain maps to one or more AICPA Trust Services Criteria controls.

01

Facility Access Controls

CC6.4

Covers all entry and exit points: perimeter barriers, badge/biometric systems, mantrap controls, visitor management, and emergency exit alarm monitoring.

  • Electronic badge provisioning & deprovisioning
  • Mantrap anti-tailgating enforcement
  • Perimeter intrusion detection
  • Visitor log retention
02

Secure Areas Protection

CC6.4

Data centers, server rooms, and media storage areas — multi-factor authentication at entry, access log review, rack locking, authorized-personnel list certification, and equipment removal procedures.

  • Multi-factor authentication at data center doors
  • Access log retention and anomaly alerting
  • Rack/cabinet tamper-evident seals
  • Certified media destruction (NIST 800-88)
03

Equipment Security

A1.2

Hardware asset tracking from arrival to disposal: RFID/barcode tagging, off-site equipment controls, third-party maintenance authorization, cabling protection and port blocking.

  • Hardware inventory completeness
  • Physical asset tagging and location logging
  • Unauthorized port access prevention
  • Cable documentation and change records
04

Environmental Safeguards

A1.1

Power resilience, fire protection, and climate control: UPS and generator testing, clean-agent suppression, continuous temperature/humidity monitoring, water leak detection.

  • UPS runtime validation and quarterly testing
  • Generator load testing and automatic transfer
  • Early-warning smoke detection
  • CRAC/CRAH redundancy and containment
05

Monitoring & Surveillance

CC6.4

CCTV coverage, intrusion detection, and 24/7 monitoring: minimum 90-day retention, blind-spot elimination, alarm escalation SLAs, and false-alarm management.

  • Camera coverage and blind-spot assessment
  • 90-day minimum recording retention
  • Motion/contact sensor perimeter coverage
  • After-hours and holiday monitoring
06

Documentation & Policies

CC5.2 / CC6.5

Policy framework and control documentation: annual policy review, access authorization procedures, auditor-ready evidence packages, and change management records.

  • Annual policy review and approval
  • Access authorization and least-privilege docs
  • Auditor-ready evidence packages
  • Change management records
07

AI & Cloud Infrastructure

CC6.4 (2026)

New in 2026 — GPU/TPU clusters, colocation/PoP security, and physical supply chain controls: hardware provenance verification, SBOM alignment, and third-party colo attestation review.

  • GPU cluster physical access and cage segregation
  • Colocation SOC 2 attestation review cadence
  • Hardware receiving and tamper detection
  • NIST 800-161r1 supply chain controls

The Maturity Scale

Every control is rated 0–5 across five evaluation criteria. The tool calculates an average score per control and per domain to determine compliance status.

0
Not Implemented

The control does not exist or has never been defined.

1
Initial

Ad-hoc, reactive controls with no formal process.

2
Developing

Control exists but is inconsistently applied and lacks full documentation.

3
Defined

Formally documented, consistently applied, and understood by responsible staff.

4
Managed

Actively monitored, measured, and improved with regular testing cycles.

5
Optimized

Continuously improved, fully automated where possible, and aligned to best-practice benchmarks.

Compliance thresholds (based on domain average)

  • ≥ 90% → Compliant
  • 75–89% → Mostly Compliant
  • 50–74% → Partially Compliant
  • < 50% → Non-Compliant

Frequently Asked Questions

Where is my data stored?

Everything stays in your browser's localStorage. Nothing is sent to a server. Your data persists across sessions on the same device and browser, but will not transfer to a different device or private/incognito window.

Can I share my assessment with a colleague?

Export CSV to share. The file contains your full assessment including all ratings, notes, and evidence. For ongoing collaboration on one assessment, both users would need to import/merge manually — a shared backend is not part of this tool.

Does this tool guarantee SSAE 18 compliance?

No. This tool helps you self-assess and identify gaps, but compliance is determined by a qualified CPA firm performing an SSAE 18 attest engagement. Always work with your auditor to confirm your control environment meets their testing standards.

What changed in the 2026 AICPA TSC update?

The most material additions are: (1) AI & Cloud Infrastructure as an explicit physical security domain, (2) hardware supply chain controls aligned to NIST 800-161r1, (3) colocation/third-party attestation now explicitly required, and (4) 90-day minimum CCTV retention.

How do I prepare for a SOC 2 audit using this tool?

Work through all 7 domains and rate every control. Address all critical and high-priority items in your remediation plan. Use the CSV export to build an evidence package aligned to auditor requests. Keep at least 3 saved snapshots to demonstrate trend improvement over time.

I accidentally cleared my browser data. Can I recover my assessment?

If you exported a CSV before clearing, you can reference those ratings to manually restore. Going forward, save assessments regularly — the saved snapshots are also stored in localStorage, so export CSV often as an off-device backup.

Ready to start your assessment?

Your progress auto-saves as you work. No account required — just open the tool and begin.