Not ready for a Complete Pen Test? How about finding out your Cyber Score in 2 mins? Click here for your Cyber Score
SPRS Score Explained: Why Most Manufacturers Are Failing and How to Fix It

SPRS Score Explained: Why Most Manufacturers Are Failing and How to Fix It

Published by Capital Cyber | Leesburg, VA | (571) 410 3066

Your SPRS score is the single most visible indicator of your cybersecurity posture to the Department of Defense. Contracting officers check it. DIBCAC auditors use it as a baseline. And under the False Claims Act, an inaccurate score can create legal liability that threatens your entire business.

Yet most defense manufacturers have SPRS scores that don’t reflect reality. They submitted optimistic numbers without performing a meaningful self assessment.

Here’s what you need to know.

What’s SPRS?

The Supplier Performance Risk System tracks contractor risk information for the DoD. For cybersecurity, SPRS stores NIST SP 800-171 self assessment scores.

Under DFARS 252.204-7019, every defense contractor handling CUI must have a current score posted in SPRS. Think of it as your cybersecurity credit score for defense contracts.

A perfect score is 110. The minimum is negative 203. Where does yours fall?

How Scoring Works

Each of the 110 controls in NIST SP 800-171 is worth 1, 3, or 5 points. Start with 110. Subtract for every control not fully implemented.

The 5-point controls are the critical ones: multi-factor authentication, encryption of CUI, incident response capabilities. Missing several of these drops your score fast.

Here’s the catch: ‘implemented’ doesn’t mean ‘downloaded’ or ‘configured.’ It means operational, consistently applied, and demonstrable to an assessor.

Why Manufacturers Are Failing

We see the same patterns across manufacturing clients:

MFA gaps.

Many shops still run passwords-only on shop floor workstations and legacy systems. This is a 5-point control you might be missing.

CUI in plain text.

Sending technical drawings and specs via unencrypted email is more common than you’d think. CUI must be encrypted in transit and at rest.

No incident response.

Documented plan, trained personnel, detection and recovery capabilities. Most small manufacturers have none of this.

Shared accounts.

Administrator access for everyone. No formal access control policies. This is exactly what assessors look for.

Security training.

Formal awareness training for all employees. Not just IT. Everyone.

The average honest score we see runs 30-70 points below what manufacturers reported.

Questions to Ask Yourself

Before you submit or update your score, answer these honestly:

  1. Do you know exactly where all your CUI lives?
  2. Can you demonstrate MFA on every system that handles it?
  3. Do you have written documentation for every control, not just policies you have?
  4. Have your employees actually been trained, or just told to be careful with emails?

If you hesitated on any of these, your score needs work.

The Quick Fix Priority

Not all gaps are equal. Here’s where to focus first:

Multi-factor authentication.

Deploy MFA everywhere, especially on email and network access. This alone can move the needle 10-20 points.

Encryption.

Get CUI off unencrypted file servers and into protected locations. Both in transit and at rest.

Logging.

You need audit logs, protected and retained, with regular review. This is often overlooked.

Access controls.

Break up shared accounts. Implement least privilege. Document it.

These four areas represent the fastest path to a better score without a full system overhaul.

One More Thing: False Claims Act Risk

Here’s why accuracy matters more than you think.

The False Claims Act imposes penalties for false representations to the government. If your SPRS score is optimistic and an auditor finds gaps, you’re exposed.

We see manufacturers who reported scores in the 80s but honestly sit at 40-50 after independent assessment. The correction feels risky. But continuing with an inaccurate score is far more dangerous.

Update your score. Show the DoD you’re addressing gaps. That’s better than waiting for an audit to reveal what you already knew.

What’s Next

Capital Cyber works with defense manufacturers to close SPRS gaps and prepare for CMMC assessment. We understand manufacturing environments and the reality of shop floor IT.

Schedule a call with Rick to get an honest assessment of where you stand.

Schedule a Meeting with Rick

Rick leads our CMMC compliance practice. He's helped dozens of DoD contractors achieve certification, and he can give you a clear picture of where you stand and what it will take to get there.

Capital Cyber | 1019B Edwards Ferry Rd. #1183, Leesburg, VA 20176.
A cybersecurity firm providing IT, not an IT company providing cybersecurity.