
Should You Self-Disclose a Compliance Gap on a DoD Contract?
Emily Bonnie
Senior Content Marketing Manager
You certified compliance with DFARS 252.204-7012. You submitted a NIST SP 800-171 score into SPRS. You flowed down cybersecurity requirements to any subcontractors.
Then months later, during an internal review, a CMMC readiness effort, or even a system change, you realize something’s off. A control wasn’t fully implemented, your SPRS score overstated maturity, or a subcontractor didn’t actually meet the requirements you thought they did.
But a compliance gap isn’t just an operational issue. Something your organization may have represented externally — in a SPRS score, DFARS compliance, or statement in a proposal — may not have been accurate at the time it was made. That distinction determines whether you’re dealing with routine remediation or something that requires a formal disclosure.
When a compliance gap can create False Claims Act exposure
The False Claims Act is one of the government’s primary tools for pursuing contractors that receive federal funds based on false or misleading representations. While it’s often associated with outright fraud, it also applies when a contractor knowingly submits a false claim for payment or makes a false statement that is material to the government’s decision to award, continue, or pay under a contract. “Knowingly” includes reckless disregard and deliberate ignorance, not just intentional deception.
That matters here because cybersecurity representations on DoD contracts are not just technical details. They can be conditions of contract award, performance, or payment. If your organization certified compliance with DFARS 252.204-7012, submitted a SPRS score, or otherwise represented a level of security maturity that wasn’t accurate at the time, the government may view that as more than a compliance miss.
False Claims Act enforcement can lead to investigations, costly settlements, treble damages, per-claim penalties, and even suspension or debarment. It also creates exposure to whistleblower suits, which is especially relevant in an environment where employees, former employees, or even competitors may surface concerns.
Consider a common scenario: you submit a SPRS score of 88 based on a self-assessment that assumes multi-factor authentication is deployed across your environment. Later, you find it was only implemented on a subset of systems.
If the government relied on that score when awarding or renewing a contract, the issue is no longer just a control gap. It raises questions about whether your original representation was materially false and whether the government made a decision based on information that wasn’t accurate.
Recommended reading
$6.8 Billion in False Claims Act Recoveries: The DOJ’s Clear Warning to the Defense Industrial Base
How to know if a compliance gap requires disclosure
One of the most common misconceptions is that any discovered compliance issue automatically creates a disclosure obligation.
Most gaps are operational. Controls drift, configurations change, and assumptions turn out to be incomplete. Those issues need to be corrected, but they don’t necessarily carry legal implications on their own.
What changes the analysis is whether the gap affects something your organization represented outside its own environment — a formal SPRS score, a DFARS certification, proposal language, subcontractor assurances, or statements tied to contract performance.
If it does, the question becomes more specific: did that representation hold up at the time it was made, and could the government have relied on it? Work through these three questions:
What exactly was represented, and where?
Start by getting specific about what your organization actually said and where that statement lives.
Look at SPRS submissions and the assumptions behind them, proposal language, contract certifications, and any security questionnaires provided to a prime or agency. You may also need to review the internal documentation used to support those statements at the time.
This step matters because not every gap touches something external. If the issue is purely internal and never tied to a representation, it’s much more likely to stay in remediation territory. If it connects directly to something that was submitted, certified, or relied on, the analysis becomes more consequential.
Was the representation inaccurate at the time it was made?
Next, determine whether the representation was actually inaccurate when it was made.
There’s a meaningful difference between a control that broke after a system change and a control that was never fully implemented in the first place. A control that drifted is usually a forward-looking remediation issue. A control that was assumed to exist but didn’t at the time of certification is something different.
Answering this question typically means reviewing system configurations, access controls, logs, and deployment records to understand how the control was functioning at the relevant point in time. This is where some organizations discover that a score or certification was based on assumptions that were never independently validated.
Could the government have relied on inaccurate information?
Even if a representation was inaccurate, the next question is whether it mattered in a way that affects risk.
Ask whether the representation was tied to a contract award, option exercise, or competitive evaluation. Consider whether the government used that information to assess your eligibility or security posture, and whether it was provided in a timeframe that could have influenced a decision.
A SPRS score isn’t just an internal metric; it’s used to evaluate contractor eligibility. Representations about DFARS compliance or subcontractor security posture can influence how risk is assessed across the defense supply chain.
If the answer to all three questions is yes, you’re evaluating a situation that may require disclosure.
Legal requirements for FCA disclosure
Disclosure isn’t always optional.
FAR 52.203-13 requires contractors with covered contracts (generally those over $5.5 million with a performance period of 120 days or more) to disclose credible evidence of a False Claims Act violation or a significant overpayment.
“Credible evidence” doesn’t mean every suspected issue must be reported immediately. It means that once the facts support a reasonable conclusion that a violation may have occurred, the obligation to disclose can be triggered.
Even when disclosure isn’t strictly required, it is often the safer strategic choice. The Department of Justice has consistently signaled that organizations that self-disclose, cooperate fully, and implement meaningful remediation tend to receive more favorable outcomes.
Legal counsel should be involved before any disclosure is made and before the internal investigation goes too far without structure. Internal investigations conducted without counsel may not be privileged, which can make internal findings discoverable in later proceedings. Getting that structure right from the outset is critical.
Recommended reading
SPRS Scoring: How to Get a Current CMMC Status and Stay Eligible for DoD Contracts
How to respond if you identify a material gap
Start by preserving evidence. Avoid modifying systems, deleting logs, or updating documentation in ways that could obscure what existed at the time of the issue. At the same time, identify which systems, contracts, and teams are affected so the scope is clear early.
From there, make ownership explicit. Ambiguity about who is leading the investigation slows everything down and increases risk. Legal, compliance, and security leadership should be involved early, with clear responsibility for moving the process forward.
Then focus on validating the facts. Review configurations, pull logs, and compare current reality to what was previously represented. Resist the urge to draw conclusions too early. Getting the facts right upfront is what allows everything that follows to proceed in a controlled way.
Within a few days, most organizations should be able to determine whether the issue falls into routine remediation, needs escalation, or may require disclosure. Early clarity is what keeps the response deliberate rather than reactive.
What a compliance disclosure typically needs to include
A well-structured disclosure explains what happened, which contracts or systems were affected, and when the issue existed. It should clearly describe what was originally represented, why that representation may have been inaccurate, and which facts are confirmed versus still under review.
The remediation story is just as important. What has already been fixed? What changes have been made to prevent the issue from happening again? Who is accountable going forward?
A disclosure that reflects a clear understanding of the issue and a serious remediation effort can shape the government’s response as much as the underlying facts.
Enforcement is rising, and maturity expectations are changing
Record False Claims Act recoveries and increasing whistleblower activity have made it clear that cybersecurity representations tied to federal contracts matter as much as ever.
In many cases, the deeper problem isn’t that a compliance gap existed — it’s that no one had visibility into it until after the fact.
That’s what’s driving a broader shift within the federal compliance landscape toward continuous validation, where controls are monitored in real time, evidence is tied directly to system configurations, and discrepancies are surfaced immediately instead of discovered months later.
That shift reduces both compliance risk and enforcement exposure. It’s also where platforms like Secureframe Defense help, by giving teams a real-time, evidence-driven view of their compliance posture. With everything flowing into one platform, teams can quickly identify and address issues before they become legal or contractual problems, and accurately attest to their compliance posture at all times.
Streamline federal compliance

Emily Bonnie
Senior Content Marketing Manager
Emily Bonnie is a seasoned digital marketing strategist with over ten years of experience creating content that attracts, engages, and converts for leading SaaS companies. At Secureframe, she helps demystify complex governance, risk, and compliance (GRC) topics, turning technical frameworks and regulations into accessible, actionable guidance. Her work aims to empower organizations of all sizes to strengthen their security posture, streamline compliance, and build lasting trust with customers.