Listen to the article

0:00
0:00

Defense Contractors Face False Claims Act Risks Under New CMMC Requirements

Defense contractors subject to Cybersecurity Maturity Model Certification (CMMC) requirements are now facing significant False Claims Act (FCA) liability risks following the program’s launch on November 10, 2025. The annual certification requirement creates recurring exposure that many contractors may have overlooked in their compliance planning.

The U.S. Department of Justice has already demonstrated its commitment to enforcement, settling seven cybersecurity fraud cases in 2025 alone. These settlements included groundbreaking actions: the first enforcement against a subcontractor and a case holding a business liable for cybersecurity violations by a federal contractor it acquired before the acquisition was finalized.

Under the regulations established in 32 C.F.R. 170.22, a senior executive must submit an annual affirmation in the Supplier Performance Risk System (SPRS) attesting that their organization “has implemented and will maintain implementation of all applicable CMMC security requirements.” This affirmation is mandatory upon achieving CMMC status, annually thereafter, and when closing out Plans of Action and Milestones (POA&Ms).

The critical component that creates legal exposure is simple but profound: without a current affirmation, contractors cannot be awarded contracts. The Defense Federal Acquisition Regulation Supplement (DFARS 252.204-7021) explicitly makes a “current” affirmation a prerequisite for both contract awards and option exercises.

“This is not merely an administrative checkbox,” explained one defense industry attorney familiar with the regulations. “It’s a recurring legal certification to the federal government that directly affects contract eligibility.”

For CMMC Level 1 compliance, only final status is permitted with no conditional status allowed. For Levels 2 and 3, contractors may hold conditional status for up to 180 days while closing out POA&Ms, but the affirmation requirement remains in effect.

The DOJ’s Civil Cyber-Fraud Initiative, launched in October 2021, signaled that the department would use the FCA as its primary enforcement tool against contractors failing to meet cybersecurity obligations. The initiative targets three specific behaviors: knowing failures to comply with cybersecurity standards, knowing misrepresentations of security practices, and knowing failures to report cyber incidents.

The enforcement theory is straightforward. When a contractor certifies compliance with cybersecurity requirements as a condition of payment or contract eligibility, and that certification is false, they have submitted a false claim under federal law. Penalties can include treble damages and substantial per-claim penalties.

The 2025 settlements reveal the government’s aggressive approach. In February, a managed care provider paid $11.25 million to settle allegations it falsely certified cybersecurity compliance in a TRICARE contract. In April, a defense contractor agreed to a $4.6 million settlement after allegedly submitting a false SPRS score—reporting a positive assessment when its actual score was negative 142.

Perhaps most concerning for the industry was a July settlement for $8.4 million where an acquiring company was explicitly named as “successor in liability” for a target’s pre-acquisition cybersecurity failures—violations that occurred years before the deal closed. Another July settlement for $1.75 million held both a contractor and its private equity owner liable for cybersecurity violations.

The FCA’s “knowing” standard is lower than many contractors realize. The law defines “knowingly” as actual knowledge, deliberate ignorance, or reckless disregard for the truth or falsity of information. This means a contractor that signs an annual affirmation without verifying compliance status, or ignores known gaps, may be accused of acting with “reckless disregard” sufficient for FCA liability.

Whistleblower provisions add another significant risk layer. Individuals who report FCA violations can receive between 15-25 percent of any recovery. The December 2025 settlement involving a supply chain subcontractor originated from a complaint filed by a former employee, highlighting how insiders with knowledge of compliance gaps can trigger investigations.

For companies acquiring defense contractors, the July successor liability settlement fundamentally changes due diligence requirements. Buyers evaluating targets with Department of War contracts or subcontracts should treat CMMC compliance as a core diligence workstream, even for companies that don’t primarily identify as defense contractors but participate in defense supply chains.

Industry experts recommend defense contractors take several immediate steps: treat affirmations as serious legal certifications, conduct internal gap assessments before affirming, document all remediation efforts, establish processes to monitor compliance changes, and address potential whistleblower risks through transparency and proper compliance.

“The CMMC affirmation requirement isn’t just another regulatory burden—it’s a legally binding certification with real enforcement consequences,” noted one cybersecurity compliance consultant. “Companies that treat this as merely an IT project rather than an enterprise risk management priority do so at their own peril.”

Fact Checker

Verify the accuracy of this article using The Disinformation Commission analysis and real-time sources.

28 Comments

  1. Lucas Z. Davis on

    The personal liability aspect with the senior executive attestation is a real game-changer. Contractors will need to ensure they have complete confidence in their CMMC compliance.

    • Jennifer Lopez on

      Absolutely. The C-suite will be on the hook, so they’ll need to be intimately involved in CMMC oversight and take full responsibility.

  2. Lucas Rodriguez on

    I’m curious to see how the CMMC requirements and FCA enforcement play out in practice. There may be some growing pains as the industry adapts to the new compliance regime.

    • Yes, it will be an interesting space to watch. The DOJ’s aggressive stance suggests they see CMMC as a key priority for rooting out cybersecurity fraud.

  3. Interesting to see the DOJ taking such an aggressive approach to CMMC enforcement. This underscores how critical it is for contractors to get their cybersecurity practices in order.

  4. Michael Garcia on

    The CMMC program seems to be a double-edged sword – it aims to improve cybersecurity, but also creates new legal liabilities for contractors. Careful planning will be essential to navigate this terrain.

  5. Michael Miller on

    This article highlights the significant risks that defense contractors now face with the new CMMC requirements. Compliance will be critical to avoid costly legal problems.

    • Ava N. Martinez on

      Agreed. Contractors need to make CMMC a top priority and devote the necessary resources to ensure they are fully compliant across the board.

  6. Amelia Johnson on

    The False Claims Act exposure is quite concerning, especially with the DOJ’s recent crackdown. Contractors will need to thoroughly review their CMMC compliance procedures to mitigate this risk.

    • Definitely. The FCA liability could be crippling, so proactive compliance will be essential. Contractors should seek legal counsel to ensure they are fully prepared.

  7. Interesting to see how the new CMMC requirements could expose defense contractors to False Claims Act liability. The annual certification seems like a significant compliance risk that many may have overlooked.

    • Agreed, the DOJ’s recent enforcement actions show they are taking this issue seriously. Contractors will need to carefully manage their CMMC compliance to avoid potential legal issues.

  8. William Thompson on

    The implications of the new CMMC requirements seem quite serious. Contractors will need to make CMMC a top priority and devote significant resources to ensuring full compliance.

    • Absolutely. With the FCA risks involved, they can’t afford to take this lightly. Robust CMMC implementation and ongoing monitoring will be essential.

  9. The required SPRS affirmation by senior execs is a significant liability risk. One false statement could potentially open the door to FCA claims. Careful oversight and documentation will be crucial for defense contractors.

  10. This is an important issue that all defense contractors need to be aware of. The article provides a good overview of the CMMC compliance challenges and associated FCA risks.

  11. Interesting article on the FCA risks from CMMC compliance. Seems like a tricky area for defense contractors to navigate, with the annual certification requirement creating recurring liability. I wonder how many companies are fully prepared for this.

  12. With the high stakes of FCA liability, defense contractors should prioritize CMMC readiness. Proactive cybersecurity investments now could pay off down the line by avoiding costly legal battles.

    • Michael Taylor on

      Agreed. The financial and reputational risks of FCA violations are substantial. Getting ahead of CMMC requirements is prudent for any defense contractor.

  13. Michael K. Johnson on

    The DOJ’s enforcement actions show they are taking CMMC compliance seriously. The settlements against subcontractors and acquired companies are especially noteworthy. Contractors will need robust cybersecurity practices to avoid FCA exposure.

  14. The DOJ’s enforcement actions demonstrate they are taking CMMC compliance very seriously. Contractors will need to be extremely diligent to avoid potential False Claims Act liability.

  15. Oliver Jackson on

    The annual CMMC certification requirement and senior executive attestation create a significant compliance burden for defense contractors. They’ll need to have robust processes in place to manage this.

    • Lucas Q. Jones on

      Absolutely. With the FCA risks involved, contractors can’t afford to let their CMMC compliance lapse. Ongoing monitoring and vigilance will be essential.

  16. Elizabeth Hernandez on

    This is an important issue for the defense industry. CMMC compliance is now critical, not just for cybersecurity, but to avoid potential False Claims Act violations and penalties.

  17. This article highlights the growing legal complexities around cybersecurity requirements for the defense industry. Companies will need specialized expertise to ensure CMMC compliance and manage their FCA exposure.

  18. Patricia L. Martin on

    The potential for False Claims Act exposure is quite concerning. Contractors will need to carefully review their CMMC readiness and shore up any gaps to avoid legal issues.

  19. Noah K. Garcia on

    The mandatory affirmation by senior executives in SPRS is a notable requirement. It really highlights the personal accountability that comes with CMMC compliance.

    • Amelia Martinez on

      That’s a good point. This personal attestation raises the stakes and makes it critical for contractors to have robust cybersecurity practices in place.

Leave A Reply

A professional organisation dedicated to combating disinformation through cutting-edge research, advanced monitoring tools, and coordinated response strategies.

Company

Disinformation Commission LLC
30 N Gould ST STE R
Sheridan, WY 82801
USA

© 2026 Disinformation Commission LLC. All rights reserved.