SPRS Submission and Annual Affirmation: The CMMC Mistakes Defense Contractors Cannot Afford in 2026
SPRS Submission and Annual Affirmation: The CMMC Mistakes Defense Contractors Cannot Afford in 2026
A lot of defense contractors are still treating SPRS submission like an administrative afterthought.
That is a mistake.
In 2026, one of the fastest ways to create contract risk is not a ransomware incident or a failed penetration test. It is something much more ordinary: an inaccurate self-assessment score, a sloppy affirmation, missing supporting evidence, or confusion about who is legally allowed to attest on behalf of the company.
I have spent three decades in cybersecurity, including time as a CIO, security leader, and compliance advisor. One pattern repeats over and over: organizations spend months arguing about tools, but lose ground on the fundamentals that auditors, primes, and contracting officers actually care about. In the CMMC world, documentation discipline and truthful representation matter just as much as technical controls.
With the CMMC final rule effective as of December 16, 2024, and CMMC requirements steadily appearing in the defense market, contractors need to tighten up how they handle:
- NIST SP 800-171 self-assessment scoring
- SPRS submissions
- annual affirmations
- POA&M eligibility and timing
- executive accountability for what gets submitted to DoD
If you are a defense contractor handling Controlled Unclassified Information (CUI), this is not busywork. It is part of your eligibility posture.
Why This Topic Matters Right Now
The market has spent a lot of energy talking about C3PAO assessments, and that makes sense. Third-party assessments are high stakes and expensive.
But before many companies ever get to that stage, they have to survive the nearer-term compliance reality: self-assessments, SPRS entries, and annual affirmations that can withstand scrutiny.
Under the CMMC program, DoD is not only concerned with whether a contractor has implemented required safeguards. It is also concerned with whether the contractor can accurately represent and maintain its cybersecurity status over time.
That is a major shift for small and mid-sized defense contractors.
The old mindset was, "We have an SSP somewhere, our MSP says we are covered, and we will figure out the paperwork when a contract requires it."
That mindset is going to hurt people.
First, What Is SPRS and Why Does It Matter?
SPRS, the Supplier Performance Risk System, is the DoD system used to capture certain contractor risk information, including NIST SP 800-171 assessment results.
For contractors subject to DFARS cybersecurity requirements, SPRS is where your assessment data becomes visible to DoD stakeholders. In practical terms, it is where your organization moves from saying "we are working on it" to making a formal representation tied to your contract posture.
For defense contractors, SPRS matters because it helps answer basic questions that affect eligibility and confidence:
- Has this company actually completed a NIST SP 800-171 assessment?
- What score did it receive?
- When was that assessment performed?
- Is the representation current?
- Has the company made the required affirmation?
A lot of organizations focus on the score and ignore the surrounding governance. I think that is backwards. A score by itself does not save you if the submission was careless, unsupported, stale, or made by the wrong person.
The 2026 Problem: Many Contractors Are Technically Working, but Administratively Weak
Here is what I am seeing in the market.
Many contractors have made real progress. They bought MFA, deployed endpoint protection, tightened remote access, documented some policies, and cleaned up privileged access. That is all good.
But when you ask for the evidence package behind the SPRS score, the room gets quiet.
Common failure patterns include:
- No clearly documented scoring workbook behind the SPRS number
- An SSP that does not match the live environment
- POA&M items that are not actually POA&M-eligible
- Leadership affirming a status they do not fully understand
- No disciplined annual review cycle before re-affirmation
- Confusion over CAGE codes, PIEE roles, and SPRS account access
- Shared systems supporting multiple contracts or entities with weak boundary documentation
Those are not small issues. They are credibility issues.
And credibility matters in the DoD ecosystem.
What the CMMC Final Rule Changed for Executive Accountability
One of the most important governance concepts in the CMMC rule is the idea of the affirming official.
This is not a random admin clicking a button.
For CMMC representations, the government expects a responsible company official to affirm that the organization is meeting the requirements associated with its claimed status. That means the affirmation is not just procedural. It is a statement with legal and business consequences.
For Level 2 contractors in particular, leadership needs to understand what they are affirming:
- Whether the self-assessment or certification status is current
- Whether the controls are implemented as represented
- Whether remaining gaps are handled in a manner allowed by the rule
- Whether the underlying documentation is accurate
If your executive team thinks affirmation is just a compliance formality, you have a governance problem.
The Biggest SPRS Submission Mistakes I See
1. Treating the SPRS score like a guess instead of a scored assessment
Your NIST SP 800-171 score should not come from a vague conversation with an MSP or a generic questionnaire.
It should come from a structured review of all 110 requirements, using the DoD assessment methodology, with traceable reasoning for each deduction.
If someone asks, "Why is your score 96 and not 88 or 104?" your team should be able to answer that without improvising.
2. Submitting before the SSP is ready
Your System Security Plan is foundational. It should describe the environment, the boundary, relevant technologies, inherited services, and how each applicable requirement is implemented.
If the SSP says one thing and your environment shows another, that discrepancy becomes the story.
A weak SSP undermines the score, the affirmation, and your overall readiness.
3. Misusing the POA&M
This one keeps burning people.
Not every unmet requirement can sit on a POA&M under CMMC. For Level 2, POA&M use is constrained. Certain controls are excluded, and conditional status depends on meeting rule thresholds.
If your team is using the POA&M as a parking lot for major control failures, you are building on sand.
4. Forgetting that annual affirmation is not a copy-paste exercise
An annual affirmation should trigger a real review:
- Did the environment change?
- Did cloud tools change?
- Did remote access expand?
- Did the CUI boundary shift?
- Did inherited services or MSP responsibilities change?
- Did any control evidence expire or become stale?
If none of those questions are being asked, the affirmation process is too weak.
5. Letting account and access issues delay submission
In practice, many contractors still struggle with PIEE access, SPRS roles, contractor administrator approvals, and CAGE code alignment. Those administrative bottlenecks can waste days or weeks, especially if the original company registrant is gone or the organization has multiple entities.
That sounds like a minor issue until a bid deadline is looming.
Then it becomes a contract issue.
What a Defensible SPRS Submission Process Looks Like
Here is the model I recommend for small and mid-sized defense contractors.
Step 1: Establish the assessment boundary before you score anything
Do not start with the spreadsheet. Start with the boundary.
Identify:
- Systems that store, process, or transmit CUI
- Administrative systems that support those assets
- External service providers and inherited controls
- Physical locations in scope
- Enclave boundaries, if you use a segmented CUI environment
A bad boundary creates a bad score.
Step 2: Validate the SSP against reality
Before you submit to SPRS, your SSP should be current enough that a knowledgeable reviewer can understand your environment without guessing.
It should clearly explain:
- who uses the system
- where CUI lives
- how access is controlled
- how logging, patching, backups, and incident response work
- what is handled internally versus by providers
This is also where good policy writing matters. If your policies are generic templates that do not reflect your operating model, they will not help much under scrutiny.
This is exactly why many contractors benefit from a structured policy set like the TalonPoint PolicyPack. Not because templates magically create compliance, but because good policy structure helps teams align their SSP, procedures, evidence, and executive review around the same operating reality.
Step 3: Score using evidence, not optimism
For each requirement, tie the determination to evidence such as:
- configuration screenshots
- platform settings
- log samples
- ticket history
- training records
- policy or procedure references
- system exports
- interview notes with responsible personnel
If your assessor or prime asked tomorrow, "Show me why you said this control is implemented," you should be able to pull that proof quickly.
Step 4: Review POA&M items for actual eligibility
If gaps remain, validate whether they are allowable for POA&M treatment under the applicable CMMC rules.
This is a place where companies fool themselves. They assume any partially implemented item can be cleaned up later. That is not how this works.
Step 5: Run an executive affirmation review before submission
The affirming official should receive a concise decision package, not a blind signature request.
At minimum, leadership should see:
- the current score
- summary of significant open risks
- SSP status
- POA&M status
- material environmental changes since the last review
- any assumptions or inherited controls the company is relying on
That is how you turn affirmation into governance instead of theater.
Step 6: Fix your administrative path early
If your team still lacks the right PIEE and SPRS access, solve that before a solicitation forces the issue.
Make sure you know:
- who the contractor administrator is
- which CAGE codes are involved
- who can add SPRS roles
- how your organization will submit and maintain records
This is not glamorous work, but it is the kind of operational detail that separates prepared contractors from frantic ones.
Annual Affirmation Should Be Run Like a Mini Internal Audit
I strongly recommend that contractors stop thinking of annual affirmation as a calendar reminder and start treating it like a mini internal audit.
A practical annual affirmation process should include:
Technical review
- MFA still enforced everywhere it should be
- Endpoint coverage still complete
- Logging still enabled and retained appropriately
- Vulnerability remediation still operating as designed
- Backups still successful and tested
Documentation review
- SSP updated for infrastructure changes
- Policies and procedures still aligned to actual practice
- Incident response contacts and escalation paths current
- Asset inventory and data flow documentation refreshed
Governance review
- Open POA&M items evaluated
- Responsible owners confirmed
- Affirming official briefed
- Submission dates tracked
- Evidence library refreshed
If that sounds like work, good. It is supposed to be. Serious compliance programs require maintenance.
What Prime Contractors and Assessors Notice Fast
There are a few red flags that experienced reviewers spot almost immediately:
- An SSP full of generic text with no company-specific detail
- Policies that name tools the company does not actually use
- Scores with no supporting rationale
- Leadership that cannot explain the scope of the environment
- POA&Ms that try to carry major structural weaknesses
- Evidence that is stale, inconsistent, or obviously assembled at the last minute
None of that inspires confidence.
The opposite does.
When a contractor can show a clean boundary, a coherent SSP, consistent policies, traceable evidence, and a disciplined affirmation process, it changes the conversation. The company looks mature. The risk looks managed. The representation looks credible.
That matters whether the audience is a C3PAO, a prime, a contracting officer, or your own board.
Practical Advice for Defense Contractors in 2026
If I were advising a 25-person or 150-person defense contractor right now, I would keep the message simple.
Do this now
- Recalculate your NIST SP 800-171 score with evidence in hand
- Update your SSP to match your real environment
- Review all POA&M items for CMMC rule alignment
- Identify your affirming official and formalize the review process
- Test your PIEE/SPRS access before you need it under pressure
- Build an annual affirmation checklist and evidence refresh cycle
Do not do this
- Do not let an MSP make unsupported compliance claims on your behalf
- Do not submit a score nobody in leadership understands
- Do not assume the SSP can wait until later
- Do not treat annual affirmation like a rubber stamp
- Do not rely on outdated templates that do not reflect your operating model
Final Thought
In cybersecurity, companies love to spend money on tools because tools feel tangible.
But CMMC is going to reward something more disciplined than tool buying. It will reward organizations that can prove what they do, explain what they do, and truthfully affirm what they do.
That is the real lesson of SPRS submission and annual affirmation in 2026.
If your controls are decent but your documentation and governance are weak, you are not as ready as you think.
If your documentation, scoring, policy structure, and executive review are tight, you put yourself in a much stronger position, not only for SPRS and annual affirmation, but for every assessment and customer review that follows.
That is where contractors should be aiming.
About the Author
The TalonPoint Security team brings 30 years of cybersecurity expertise with CISM and CISSP certifications. As a practicing Chief Information Officer, our founder implements the security policies and compliance frameworks we write about. TalonPoint Security was founded to make professional CMMC compliance accessible to small and medium-sized defense contractors.