SPRSify

CMMC Level 1 SPRS Submission Package Generator — Generate SSP + Annual Affirmation + POA&M in 30 minutes.

SPRS Score (live)
110
/ 110
0 / 17 answered

1. Company Information

2. Practice Assessment (17 Controls — FAR 52.204-21)

For each practice, select MET (fully implemented), NOT MET (not fully implemented), or N/A (not applicable to your system boundary). Expand the evidence hint to see what to document.

Access Control (AC)

AC.1.001 SPRS weight: 8 Authorized User Access

Limit information system access to authorized users, processes, and devices only.

💡 Evidence hint (click to expand)

Example: Active Directory with quarterly access reviews; VPN+MFA for remote access

AC.1.002 SPRS weight: 1 Transaction Authorization

Limit access to only the types of transactions and functions authorized users may execute.

💡 Evidence hint (click to expand)

Example: RBAC with Viewer/Contributor/Owner roles; formal role matrix reviewed annually

AC.1.003 SPRS weight: 8 External System Connections

Verify and control connections to external information systems.

💡 Evidence hint (click to expand)

Example: Documented external connection inventory; firewall rules blocking unauthorized outbound traffic

AC.1.004 SPRS weight: 8 Public System FCI Control

Control information posted or processed on publicly accessible systems.

💡 Evidence hint (click to expand)

Example: Quarterly review of public website confirming no FCI is present

Identification & Authentication (IA)

IA.1.076 SPRS weight: 1 User & Device Identification

Identify information system users, processes acting on behalf of users, or devices.

💡 Evidence hint (click to expand)

Example: Asset inventory of all users, service accounts, and devices; reviewed monthly

IA.1.077 SPRS weight: 8 Authentication Requirement

Authenticate the identities of users, processes, or devices before allowing access.

💡 Evidence hint (click to expand)

Example: Password + MFA (Microsoft Authenticator) enforced via Conditional Access for all FCI systems

Media Protection (MP)

MP.1.118 SPRS weight: 8 Media Sanitization & Disposal

Sanitize or destroy information system media before disposal or reuse.

💡 Evidence hint (click to expand)

Example: NIST 800-88-compliant wiping (Blancco); certified shredder; destruction log retained 3+ years

Physical Protection (PE)

PE.1.131 SPRS weight: 8 Physical Access Control

Limit physical access to information systems and operating environments to authorized individuals.

💡 Evidence hint (click to expand)

Example: Badge readers on server room; quarterly physical access audits; after-hours log review

PE.1.132 SPRS weight: 8 Visitor Management

Escort visitors, monitor visitor activity, and maintain physical access audit logs.

💡 Evidence hint (click to expand)

Example: Visitor sign-in with government-issued ID; escort badge; visitor log retained 3+ years

Risk Assessment (RA)

RA.1.138 SPRS weight: 7 Periodic Risk Assessment

Periodically assess risk to organizational operations, assets, and individuals.

💡 Evidence hint (click to expand)

Example: Annual risk assessment per NIST SP 800-30; findings documented in Risk Register

System & Communications Protection (SC)

SC.1.175 SPRS weight: 8 Boundary Protection

Monitor, control, and protect communications at external and key internal boundaries.

💡 Evidence hint (click to expand)

Example: NGFW with IDS/IPS; centralized SIEM logging; security alerts reviewed weekly

SC.1.176 SPRS weight: 8 Network Segmentation

Implement subnetworks for publicly accessible components physically or logically separated from internal networks.

💡 Evidence hint (click to expand)

Example: Public web servers in dedicated DMZ VLAN; firewall separation from internal FCI network

System & Information Integrity (SI)

SI.1.210 SPRS weight: 7 Flaw Remediation

Identify, report, and correct information system flaws in a timely manner.

💡 Evidence hint (click to expand)

Example: CISA KEV subscription; vulnerability scanner; critical CVEs patched within 15 days

SI.1.211 SPRS weight: 1 Malicious Code Protection

Provide protection from malicious code at appropriate locations within information systems.

💡 Evidence hint (click to expand)

Example: Microsoft Defender for Business deployed on all endpoints; real-time protection enabled

SI.1.212 SPRS weight: 7 Security Scanning

Perform periodic system scans and real-time scans of files from external sources.

💡 Evidence hint (click to expand)

Example: Weekly full AV scans; real-time scanning for all downloads and USB insertions

SI.1.213 SPRS weight: 7 AV Signature Updates

Update malicious code protection mechanisms when new releases are available.

💡 Evidence hint (click to expand)

Example: Automatic AV signature updates (daily minimum); verified via management console

Configuration Management (CM)

CM.2.061 SPRS weight: 7 Baseline Configuration

Establish and maintain baseline configurations and inventories throughout system development life cycles.

💡 Evidence hint (click to expand)

Example: System baseline configuration documented; formal change control with rollback plan

110
SPRS Score / 110
Session ID: —

Next Steps to SPRS Submission: