The Complete Security Hardening Manual for Cannabis Seed-to-Sale Tracking Systems

Your compliance tracking system is a direct line to state regulators—and a prime target for attackers. This guide shows you exactly how to lock it down.


WHY THIS GUIDE MATTERS

Your seed-to-sale tracking system isn’t just compliance software. It’s a direct connection to state regulators containing:

  • Your complete inventory records
  • Every transaction your business has ever conducted
  • Employee information and access credentials
  • API keys that could be exploited
  • Business intelligence competitors would pay for

When attackers compromise your Metrc or BioTrack credentials, they can:

  • Manipulate your inventory records
  • Create compliance violations that trigger audits
  • Steal competitive business intelligence
  • Lock you out during critical sales periods
  • Cause regulatory penalties up to license revocation

Real-world incidents:

  • 2023: California dispensary lost Metrc access for 72 hours during 4/20 weekend after credential theft
  • 2024: Colorado cultivator faced $15,000 fine after API credentials were compromised and inventory records altered
  • 2024: Michigan multi-location operator discovered ex-employee retained Metrc access for 8 months post-termination

This guide covers:

  • Account security hardening
  • API credential management
  • User access controls
  • Monitoring and alerting
  • State-specific configurations for all 24 Metrc states
  • BioTrack security for all BioTrack states
  • Integration security best practices
  • Incident response for tracking system compromises

Cannabis Business Security Tools | cannabisrisk.diyComprehensive security tools, checklists, and compliance resources for cannabis businesses. Estimate breach costs, audit PoS, review vendor security, and more.cannabisrisk.diy


SECTION 1: UNDERSTANDING YOUR TRACKING SYSTEM ATTACK SURFACE

1.1 What Attackers Target

Target Why It’s Valuable Risk Level

Admin credentials Full system control, can add users, change settings CRITICAL

User credentials Transaction access, inventory manipulation HIGH

API keys Automated access, often over-permissioned CRITICAL

Integration accounts Bridge between POS and tracking system HIGH

Session tokens Hijack active sessions MEDIUM

Backup credentials Often forgotten, never rotated HIGH


1.2 Common Attack Vectors

Credential Theft

  • Phishing emails targeting compliance staff
  • Credential stuffing (reused passwords from other breaches)
  • Keyloggers on shared workstations
  • Shoulder surfing in open office environments

API Exploitation

  • Hardcoded credentials in POS integrations
  • Exposed API keys in code repositories
  • Over-permissioned API accounts
  • Lack of API key rotation

Insider Threats

  • Terminated employees with active access
  • Over-privileged users
  • Shared accounts hiding individual actions
  • Contractors with persistent access

Session Hijacking

  • Public WiFi usage
  • Shared computers without logout
  • Browser session theft
  • Man-in-the-middle attacks

1.3 Compliance Tracking System Architecture

┌─────────────────────────────────────────────────────────────────┐
│                    STATE REGULATORY SYSTEM                       │
│                    (Metrc / BioTrack Server)                    │
└─────────────────────────────────────────────────────────────────┘

                              │ HTTPS/API

        ┌─────────────────────┼─────────────────────┐
        │                     │                     │
        ▼                     ▼                     ▼
┌───────────────┐    ┌───────────────┐    ┌───────────────┐
│  Web Browser  │    │  POS System   │    │  Third-Party  │
│  (Manual)     │    │  (API)        │    │  Integrations │
└───────────────┘    └───────────────┘    └───────────────┘
        │                     │                     │
        ▼                     ▼                     ▼
┌───────────────┐    ┌───────────────┐    ┌───────────────┐
│   Employee    │    │  API Keys     │    │  Vendor       │
│   Credentials │    │  Credentials  │    │  Credentials  │
└───────────────┘    └───────────────┘    └───────────────┘

SECURITY POINTS:
★ Each connection point is an attack surface
★ Each credential type requires different protection
★ Each integration multiplies risk

Every arrow in this diagram is a potential attack path.


SECTION 2: METRC SECURITY CONFIGURATION

2.1 Metrc System Overview

Metrc (Marijuana Enforcement Tracking Reporting Compliance) is the most widely used cannabis tracking system, operating in 24 states plus US Virgin Islands.

Current Metrc States (as of December 2025):

State Launch Date Sync Requirement Unique Considerations

Alaska 2018 24 hours Remote access challenges

California 2018 Real-time (2025) Largest market, strictest enforcement

Colorado 2014 15 minutes Original Metrc state, mature rules

Louisiana 2022 24 hours Medical only, limited licenses

Maine 2020 24 hours Adult-use + medical

Maryland 2017 24 hours Transitioning to adult-use

Massachusetts 2018 24 hours Strict compliance culture

Michigan 2019 24 hours Large market, active enforcement

Minnesota 2025 24 hours New adult-use market

Mississippi 2024 24 hours Medical only

Missouri 2023 24 hours Fast-growing market

Montana 2022 24 hours Rural access challenges

Nevada 2017 24 hours Tourism-driven market

New Jersey 2022 24 hours High compliance focus

Ohio 2024 24 hours New adult-use market

Oklahoma 2019 24 hours Highest license count nationally

Oregon 2016 24 hours Mature market

South Dakota 2024 24 hours Medical program

US Virgin Islands 2023 24 hours Unique territorial rules

Virginia 2024 24 hours Limited medical program

Washington DC 2022 24 hours Medical only, unique jurisdiction

West Virginia 2021 24 hours Medical program

Note: California transitioned to real-time sync requirements as of January 1, 2025—the strictest in the nation.


2.2 Metrc Account Security Hardening

2.2.1 Password Requirements

Metrc Minimum Requirements:

  • 8+ characters
  • Upper and lowercase letters
  • At least one number
  • At least one special character

CannaSecure Recommended Requirements:

  • 16+ characters minimum
  • Use passphrase format (e.g., “Correct-Horse-Battery-Staple-2025!”)
  • Unique password not used anywhere else
  • Stored in enterprise password manager only
  • Changed every 90 days or immediately if suspected compromise

Password Configuration Checklist:

User Password Length Unique? In Password Manager? Last Changed

☐ 16+ chars ☐ Yes ☐ Yes

☐ 16+ chars ☐ Yes ☐ Yes

☐ 16+ chars ☐ Yes ☐ Yes

☐ 16+ chars ☐ Yes ☐ Yes


2.2.2 Multi-Factor Authentication (MFA)

Metrc MFA Status by State:

State MFA Available MFA Required MFA Type

California ✅ Yes ✅ Required (2025) TOTP Authenticator

Colorado ✅ Yes ⚠️ Recommended TOTP Authenticator

Michigan ✅ Yes ⚠️ Recommended TOTP Authenticator

Nevada ✅ Yes ⚠️ Recommended TOTP Authenticator

Massachusetts ✅ Yes ⚠️ Recommended TOTP Authenticator

[All others] ✅ Yes ⚠️ Recommended TOTP Authenticator

MFA Setup Instructions:

  • Log into Metrc → Click username (top right) → My Account

  • Navigate to Security SettingsTwo-Factor Authentication

  • Click Enable 2FA Use authenticator app to scan QR code:

  • Recommended: 1Password, Authy, Microsoft Authenticator

  • Acceptable: Google Authenticator

  • NOT recommended: SMS (SIM swap vulnerable)

  • Enter verification code to confirm setup Save backup codes securely:

  • Store in password manager

  • Print physical copy for safe

  • Do NOT store in email or cloud documents

MFA Implementation Checklist:

User MFA Enabled? Method Backup Codes Secured?

☐ Yes

☐ Yes

☐ Yes

☐ Yes

☐ Yes

☐ Yes


2.2.3 Account Lockout Settings

Metrc Default Settings:

  • Lockout after 5 failed attempts
  • 30-minute lockout period
  • Account unlock by admin or timeout

Recommended Monitoring:

  • Alert on 3+ failed login attempts
  • Investigate any lockout immediately
  • Document lockout incidents

Lockout Response Procedure:

  • Do NOT immediately unlock—investigate first
  • Contact user via phone (not email) to verify
  • Check for other suspicious activity
  • If legitimate, reset password AND unlock
  • If suspicious, investigate before unlocking
  • Document incident in security log

2.2.4 Session Security

Metrc Session Timeout:

  • Default: 15-30 minutes of inactivity (varies by state)
  • Session terminates on browser close

Best Practices:

Practice Implementation

Always log out when finished Click “Logout” explicitly

Never use “Remember Me” Disable if available

Clear browser data after session Use incognito/private browsing

Don’t access on shared computers Use dedicated workstations

Never access on public WiFi Use VPN if remote access needed


2.3 Metrc User Management

2.3.1 User Roles and Permissions

Metrc Standard Roles:

Role Permissions Who Should Have It

Admin Full access, user management, settings Owner, Compliance Manager only

Manager Most functions, no user management General Manager, Operations Lead

Data Entry Create/edit packages, record sales Budtenders, Inventory Staff

View Only Read-only access to reports Accountants, Consultants

Principle of Least Privilege: Every user should have the minimum access required to do their job.

User Access Review Checklist:

User Role Access Justified? Last Review Action Needed

☐ Yes ☐ No

☐ Yes ☐ No

☐ Yes ☐ No


2.3.2 User Provisioning Process

New User Setup Procedure:

Authorization Required

  • Written request from department manager
  • Approved by Compliance Officer
  • Documented in HR file

Background Verification

  • Confirm state background check completed
  • Verify employee badge issued
  • Confirm employment start date

Account Creation

  • Use business email only (no personal)
  • Assign appropriate role (least privilege)
  • Set temporary password

Initial Setup (with employee)

  • Employee creates permanent password (16+ chars)
  • Employee enables MFA on their device
  • Employee saves backup codes securely
  • Employee signs Metrc acceptable use policy

Documentation

  • Record account creation date
  • Record role assigned
  • File signed policy acknowledgment

New User Checklist:

☐ Authorization documented ☐ Background check verified ☐ Account created with correct role ☐ Password requirements met ☐ MFA enabled and verified ☐ Backup codes secured ☐ Acceptable use policy signed ☐ Access documented in user log


2.3.3 User Deprovisioning Process

⚠️ CRITICAL: Deactivate Metrc access IMMEDIATELY upon termination

Same-Day Termination Procedure:

Time Action Responsible

T+0 (Termination) Disable Metrc account Compliance Officer

T+0 Change any shared passwords user knew IT Lead

T+0 Revoke API keys user had access to IT Lead

T+1 hour Verify account disabled Manager

T+24 hours Audit recent account activity Compliance Officer

Metrc Account Deactivation Steps:

  • Log in as Admin
  • Navigate to Admin → Employees
  • Find employee record
  • Click “Deactivate”
  • Confirm deactivation
  • Screenshot confirmation for documentation

Deprovisioning Checklist:

☐ Metrc account deactivated ☐ Deactivation screenshot saved ☐ Shared passwords changed ☐ API keys rotated (if applicable) ☐ Recent activity audited ☐ Deprovisioning documented

Quarterly Access Review:

User Still Employed? Role Still Appropriate? Action

☐ Yes ☐ No ☐ Yes ☐ No

☐ Yes ☐ No ☐ Yes ☐ No

☐ Yes ☐ No ☐ Yes ☐ No


2.4 Metrc API Security

2.4.1 Understanding Metrc API Keys

What is an API Key? An API (Application Programming Interface) key is a credential that allows your POS system or other software to communicate directly with Metrc without human login.

API Key Components:

  • User Key: Identifies your Metrc user account
  • Software Key: Identifies the integrated software (POS)
  • Vendor Key: Identifies the software vendor

Why API Keys Are Critical:

  • They have automated access to your data
  • They often run 24/7 without supervision
  • Compromised keys can operate undetected
  • They may have broader permissions than needed

2.4.2 API Key Security Best Practices

Storage Requirements:

✅ Acceptable ❌ Never Acceptable

Enterprise password manager (1Password, LastPass Business) Plaintext in code files

Encrypted secrets vault (AWS Secrets Manager, HashiCorp Vault) Email or chat messages

Hardware security module (HSM) Spreadsheets or documents

Encrypted environment variables Sticky notes or paper

Shared drives or cloud storage

Code repositories (GitHub, GitLab)

API Key Management Checklist:

Key Name Purpose Stored Securely? Last Rotated Rotation Due

☐ Yes

☐ Yes

☐ Yes


2.4.3 API Key Rotation Procedure

Rotation Frequency:

  • Minimum: Every 90 days
  • Recommended: Every 30 days
  • Immediately: After any suspected compromise
  • Immediately: After any employee termination with API access

Rotation Steps:

Generate new API key in Metrc

  • Admin → API Keys → Generate New

Update POS/integration systems with new key

  • Follow POS vendor documentation
  • Test in staging environment if available

Verify new key is working

  • Confirm sync is successful
  • Monitor for errors

Revoke old API key

  • Admin → API Keys → Revoke
  • Do this only AFTER new key is confirmed working

Document rotation

  • Record date, reason, who performed

API Key Rotation Log:

Date Key Name Reason Performed By Old Key Revoked?

Scheduled rotation

☐ Yes

☐ Yes

☐ Yes


2.4.4 API Activity Monitoring

What to Monitor:

Activity Alert Threshold Response

Failed API calls 10+ in 1 hour Investigate immediately

API calls outside business hours Any Review next business day

Unusual data volume 2x normal Investigate immediately

API calls from new IP Any Verify source

Bulk data exports Any Verify authorization

Setting Up Monitoring:

Most POS systems provide API logging. Work with your vendor to:

  • Enable detailed API logging
  • Set up alerts for anomalies
  • Review logs weekly
  • Retain logs for 1+ year

Weekly API Review Checklist:

☐ Review API error logs ☐ Check for unusual access patterns ☐ Verify all API calls are from known sources ☐ Confirm sync is current ☐ Document any anomalies


2.5 State-Specific Metrc Security Configurations

2.5.1 California

Regulatory Body: Department of Cannabis Control (DCC) Metrc URL: https://ca.metrc.com

California-Specific Requirements (2025):

Requirement Deadline Penalty for Non-Compliance

Real-time sync January 1, 2025 $5,000 - $52,500 per violation

MFA required January 1, 2025 Compliance warning, potential fine

Track & Trace training Before access granted Access denied

California Security Configuration:

☐ MFA enabled for ALL users (required)
☐ Real-time sync configured (no delay acceptable)
☐ API monitoring enabled with alerts
☐ Daily reconciliation process documented
☐ User access reviewed monthly
☐ Training certificates on file for all users

California Sync Failure Protocol:

Time Since Last Sync Action Required

0-1 hour Monitor, investigate cause

1-4 hours Escalate to IT, notify manager

4-8 hours Manual Metrc entry, notify DCC

8+ hours Emergency notification to DCC, document everything


2.5.2 Colorado

Regulatory Body: Marijuana Enforcement Division (MED) Metrc URL: https://co.metrc.com

Colorado-Specific Requirements:

Requirement Standard Penalty Range

Sync frequency 15 minutes maximum $2,500 - $25,000

User training Before access granted Access denied

Inventory variance ±2% or 6 units Investigation triggered

Colorado Security Configuration:

☐ MFA enabled for all users (strongly recommended)
☐ 15-minute sync tolerance configured
☐ Separate medical/retail tracking (if applicable)
☐ RFID tag security (yellow=medical, blue=retail)
☐ Daily reconciliation documented
☐ User access reviewed quarterly

Colorado Tag Security:

Tag Type Color Use Case Security Note

Medical Plant Yellow Medical cultivation Store separately

Retail Plant Blue Retail cultivation Store separately

Medical Package Yellow Medical products Track by license type

Retail Package Blue Retail products Never mix with medical


2.5.3 Michigan

Regulatory Body: Cannabis Regulatory Agency (CRA) Metrc URL: https://mi.metrc.com

Michigan-Specific Requirements:

Requirement Standard Notes

Sync frequency 24 hours End of business day

Package tracking All products Including internal transfers

Waste documentation Video + Metrc entry Required for all waste

Michigan Security Configuration:

☐ MFA enabled for all users
☐ Daily sync schedule established
☐ Internal transfer tracking configured
☐ Waste documentation process documented
☐ Employee badge cross-referenced with Metrc access
☐ Quarterly access audits performed


2.5.4 Nevada

Regulatory Body: Cannabis Compliance Board (CCB) Metrc URL: https://nv.metrc.com

Nevada-Specific Requirements:

Requirement Standard Notes

Sync frequency 24 hours Before next business day

Tourism considerations High-volume Scale infrastructure accordingly

Transport tracking Real-time All vehicle transfers

Nevada Security Configuration:

☐ MFA enabled for all users
☐ High-volume capacity verified (tourism spikes)
☐ Transport manifest security configured
☐ API rate limiting appropriate for volume
☐ Multiple user accounts for busy periods
☐ Failover procedures documented


2.5.5 Massachusetts

Regulatory Body: Cannabis Control Commission (CCC) Metrc URL: https://ma.metrc.com

Massachusetts-Specific Requirements:

Requirement Standard Notes

Sync frequency 24 hours Strict enforcement

Host Community Agreements Tracked Impact reporting

Social equity tracking Required Separate reporting

Massachusetts Security Configuration:

☐ MFA enabled for all users
☐ Social equity reporting access configured
☐ Host community data secured
☐ Delivery tracking configured (if applicable)
☐ Agent card cross-referenced with Metrc access
☐ Monthly access reviews


2.5.6 Other Metrc States Quick Reference

State Key Security Consideration

Alaska Remote access security critical

Louisiana Limited license, high-value target

Maine Dual-use tracking (med + rec)

Maryland Transitioning market, changing rules

Minnesota New market, establishing procedures

Mississippi Medical only, limited access

Missouri Fast-growing, scale considerations

Montana Rural connectivity challenges

New Jersey High compliance scrutiny

Ohio New market, establishing baselines

Oklahoma Highest license count, varied security

Oregon Mature market, sophisticated threats

South Dakota Medical program, limited

USVI Unique territorial considerations

Virginia Limited medical, high regulation

Washington DC Federal jurisdiction overlap

West Virginia Medical program, limited


SECTION 3: BIOTRACK SECURITY CONFIGURATION

3.1 BioTrack System Overview

BioTrack (BioTrackTHC) is the second-largest cannabis tracking system, now owned by Dutchie.

Current BioTrack States:

State Status Notes

Delaware Active Medical program

Hawaii Active Medical program

Illinois Active Large adult-use market

New Hampshire Active Medical program

New Mexico Active Adult-use market

New York Active Growing adult-use market

North Dakota Active Medical program

Puerto Rico Active Medical program

Washington Active Mature market (original state)


3.2 BioTrack Account Security Hardening

3.2.1 Password Configuration

BioTrack Password Requirements:

  • Minimum 8 characters
  • Complexity requirements vary by state

CannaSecure Recommended:

  • 16+ characters
  • Passphrase format
  • Unique to BioTrack only
  • Enterprise password manager storage
  • 90-day rotation minimum

Password Checklist:

User Length Unique? Password Manager? Last Changed

☐ 16+ ☐ Yes ☐ Yes

☐ 16+ ☐ Yes ☐ Yes


3.2.2 Multi-Factor Authentication

BioTrack MFA Availability:

State MFA Available MFA Required

Illinois ✅ Yes ⚠️ Recommended

Washington ✅ Yes ⚠️ Recommended

New York ✅ Yes ⚠️ Recommended

New Mexico ✅ Yes ⚠️ Recommended

[Others] ✅ Yes ⚠️ Recommended

MFA Setup Process:

  • Log into BioTrackAccount Settings
  • SecurityTwo-Factor Authentication
  • Enable → Select authenticator app
  • Scan QR code with authenticator
  • Verify with test code
  • Save backup codes securely

3.2.3 Session Management

BioTrack Session Settings:

Setting Default Recommended

Session timeout 30 minutes Keep default or shorter

Concurrent sessions Allowed Monitor for abuse

Remember me Available Disable

Session Security Checklist:

☐ Timeout set appropriately ☐ “Remember me” disabled ☐ Concurrent session monitoring enabled ☐ Logout procedure trained


3.3 BioTrack User Management

3.3.1 User Roles

BioTrack Standard Roles:

Role Access Level Appropriate For

Administrator Full access Owner, Compliance Manager

Manager Most functions GM, Operations

Clerk Transaction entry Budtenders

Viewer Read-only Accountants

Role Assignment Checklist:

User Current Role Appropriate? Action

☐ Yes ☐ No

☐ Yes ☐ No


3.3.2 User Lifecycle Management

New User Process:

  • Obtain written authorization
  • Verify state agent card/license
  • Create account with appropriate role
  • Set temporary password
  • User completes setup (password + MFA)
  • User signs acceptable use policy
  • Document in user log

Termination Process:

  • Immediately deactivate BioTrack account
  • Rotate any shared passwords
  • Revoke API access if applicable
  • Audit recent activity
  • Document deactivation

3.4 BioTrack API Security

3.4.1 API Key Management

BioTrack API Structure:

  • API credentials issued by BioTrack/Dutchie
  • Tied to software vendor
  • Used for POS integration

Security Requirements:

Requirement Implementation

Storage Encrypted secrets vault only

Access Need-to-know basis

Rotation Every 90 days minimum

Monitoring Log all API calls

Revocation Immediate upon compromise

API Key Inventory:

Key Purpose Vendor Last Rotated Stored Securely?

☐ Yes

☐ Yes


3.4.2 API Monitoring

What to Monitor:

Activity Alert Threshold

Failed authentications 5+ in 1 hour

Bulk data requests Any unusual volume

Off-hours access Any

New integration source Any


3.5 State-Specific BioTrack Configurations

3.5.1 Illinois

Regulatory Body: Illinois Department of Financial and Professional Regulation (IDFPR)

Illinois-Specific Requirements:

Requirement Standard

Sync frequency Daily minimum

Social equity tracking Required

Agent card verification Cross-reference with BioTrack access

Illinois Security Configuration:

☐ MFA enabled for all users
☐ Agent card numbers verified in BioTrack
☐ Social equity reporting access restricted
☐ Daily sync schedule documented
☐ IDFPR notification procedures in place
☐ Quarterly access audits


3.5.2 Washington

Regulatory Body: Liquor and Cannabis Board (LCB)

Washington-Specific Requirements:

Requirement Standard

Sync frequency Daily minimum

Traceability Seed-to-sale complete

Manifest tracking All transfers

Washington Security Configuration:

☐ MFA enabled for all users
☐ Manifest security configured
☐ Transport tracking enabled
☐ Daily reconciliation documented
☐ LCB notification procedures in place
☐ Monthly access reviews


3.5.3 New York

Regulatory Body: Office of Cannabis Management (OCM)

New York-Specific Requirements:

Requirement Standard

Social equity priority Tracking required

Conditional licensing Phase compliance

Adult-use transition Evolving requirements

New York Security Configuration:

☐ MFA enabled for all users
☐ Social equity tracking configured
☐ Conditional license milestones tracked
☐ OCM notification procedures documented
☐ Evolving regulation monitoring
☐ Monthly access reviews


3.5.4 Other BioTrack States Quick Reference

State Key Security Consideration

Delaware Medical program, limited licenses

Hawaii Island logistics, network reliability

New Hampshire Medical only, high compliance

New Mexico Growing adult-use market

North Dakota Medical program, limited

Puerto Rico Territorial rules, network challenges


SECTION 4: POS INTEGRATION SECURITY

4.1 Understanding POS-Tracking System Integration

┌─────────────────────────────────────────────────────────────┐
│                         POS SYSTEM                          │
│         (Flowhub, Dutchie, Treez, Jane, etc.)              │
└─────────────────────────────────────────────────────────────┘

                              │ API Credentials
                              │ Encrypted Connection

┌─────────────────────────────────────────────────────────────┐
│                    TRACKING SYSTEM                          │
│                  (Metrc or BioTrack)                        │
└─────────────────────────────────────────────────────────────┘

SECURITY POINTS:
★ API credentials stored in POS
★ Connection must be encrypted (HTTPS)
★ Sync frequency must meet state requirements
★ Errors must be monitored and alerted


4.2 POS Integration Security Checklist

Initial Configuration:

☐ API credentials stored encrypted in POS ☐ HTTPS connection verified ☐ TLS 1.2+ confirmed ☐ Sync frequency configured per state requirement ☐ Error alerting configured ☐ Failover procedures documented

Ongoing Maintenance:

☐ API credentials rotated every 90 days ☐ Sync errors reviewed daily ☐ POS security updates applied promptly ☐ Integration tested after POS updates ☐ Vendor security reviewed annually


4.3 POS Vendor Integration Security

Questions to Ask Your POS Vendor:

Question Acceptable Answer

How are Metrc/BioTrack API credentials stored? Encrypted at rest, AES-256 minimum

Who at your company can access our credentials? Limited, audited, need-to-know

How do you handle credential rotation? Automated or documented process

What happens if your systems are breached? Documented IR plan, notification commitment

Do you have SOC 2 certification? Yes, Type II preferred


4.4 Common POS Systems Security Configuration

4.4.1 Flowhub

Metrc Integration Security:

  • API credentials: Encrypted in Flowhub vault
  • Sync monitoring: Dashboard available
  • Error alerts: Configurable

Security Configuration:

☐ Admin accounts use MFA
☐ User roles properly assigned
☐ API credential rotation scheduled
☐ Sync monitoring dashboard reviewed daily
☐ Error alerts configured


4.4.2 Dutchie POS

BioTrack/Metrc Integration Security:

  • Native BioTrack integration (same company)
  • Metrc integration available
  • Centralized credential management

Security Configuration:

☐ Admin accounts use MFA
☐ User permissions minimized
☐ Integration status monitored
☐ Dutchie security updates applied
☐ Compliance dashboard reviewed


4.4.3 Treez

Metrc Integration Security:

  • API credentials: Stored encrypted
  • Real-time sync: Available for California
  • Error monitoring: Built-in

Security Configuration:

☐ Admin accounts use MFA
☐ Role-based access configured
☐ Metrc sync status monitored
☐ API credentials documented (securely)
☐ Treez security updates applied


4.4.4 Jane

Metrc Integration Security:

  • Menu and ordering platform
  • Integrates with POS for compliance
  • Separate security considerations

Security Configuration:

☐ Admin accounts use MFA
☐ POS integration secured
☐ Menu management access restricted
☐ Customer data handling reviewed
☐ Jane security updates applied


SECTION 5: MONITORING AND ALERTING

5.1 What to Monitor

Critical Monitoring Points:

System What to Monitor Alert Threshold

Metrc/BioTrack Login Failed logins 3+ failures

Metrc/BioTrack Login Successful login from new IP Any

Metrc/BioTrack Login Login outside business hours Any

API Failed API calls 10+ per hour

API API calls from new source Any

Sync Sync failure Any

Sync Sync delay exceeding threshold Per state requirement

User New user created Any

User User permissions changed Any

User User deactivated Any

Data Bulk data export Any

Data Inventory adjustment Review daily


5.2 Building a Monitoring Dashboard

Daily Review Checklist:

Check Status Notes

Sync status current ☐ OK ☐ Issue

Failed logins reviewed ☐ OK ☐ Issue

API errors reviewed ☐ OK ☐ Issue

Inventory discrepancies ☐ OK ☐ Issue

User activity normal ☐ OK ☐ Issue

Weekly Review Checklist:

Check Status Notes

All user access appropriate ☐ OK ☐ Issue

API credentials rotation due ☐ No ☐ Yes

Security updates available ☐ No ☐ Yes

Unusual patterns identified ☐ No ☐ Yes


5.3 Alert Response Procedures

Failed Login Alert:

Step Action

1 Identify affected user account

2 Contact user via phone to verify

3 If legitimate: Reset password, document

4 If suspicious: Lock account, investigate

5 Review for related suspicious activity

Sync Failure Alert:

Step Action

1 Check Metrc/BioTrack status page

2 If system-wide outage: Document, monitor

3 If our side: Check API credentials, connectivity

4 If persists 1+ hour: Escalate to IT/vendor

5 If persists 4+ hours: Notify state regulator

6 Begin manual tracking if necessary

New User Alert:

Step Action

1 Verify authorization exists

2 Confirm HR/management approved

3 If unauthorized: Deactivate immediately, investigate

4 Document verification


5.4 Log Retention Requirements

Log Type Minimum Retention Recommended

Login logs 1 year 3 years

API logs 1 year 3 years

Transaction logs Per state requirement 5 years

User management logs 3 years 7 years

Security incident logs 7 years Indefinite


SECTION 6: INCIDENT RESPONSE FOR TRACKING SYSTEMS

6.1 Tracking System Compromise Indicators

Signs Your Tracking System May Be Compromised:

Indicator Severity Immediate Action

Unexpected password reset HIGH Lock account, investigate

Login from unknown IP/location HIGH Verify with user, investigate

Inventory records changed unexpectedly CRITICAL Lock accounts, audit all changes

API errors with authentication MEDIUM Check credentials, rotate if needed

User created without authorization CRITICAL Deactivate user, investigate

Bulk data export CRITICAL Lock accounts, investigate source

MFA disabled on account HIGH Re-enable, verify authorization


6.2 Immediate Response Procedure

If You Suspect Tracking System Compromise:

FIRST 15 MINUTES:

Do NOT make hasty changes (preserve evidence)

Document what you observed:

  • What happened?
  • When?
  • What accounts/data affected?

Notify Incident Commander

Screenshot all suspicious activity


FIRST HOUR:

Contain the compromise:

Action Completed

Change admin passwords ☐

Rotate API credentials ☐

Enable MFA if not already ☐

Lock suspicious accounts ☐

Review recent user changes ☐

Notify state regulator (if required or recommended)

Begin manual tracking (if system integrity uncertain)


FIRST 24 HOURS:

Full audit of system:

Audit Item Reviewed Findings

All user accounts ☐

All permissions ☐

Recent transactions ☐

Recent inventory changes ☐

API activity logs ☐

Login history ☐

Verify inventory accuracy (physical count may be needed)

Document everything for regulator


6.3 Regulatory Notification

When to Notify State Regulator:

Situation Notification

Confirmed unauthorized access Required - Immediately

Inventory records manipulated Required - Immediately

Extended sync failure (4+ hours) Required - Same day

Suspected compromise, unconfirmed Recommended - Within 24 hours

Credential theft, no system access Recommended - Within 48 hours

Notification Template:

To: [State Regulatory Agency]
From: [License Holder]
License #: [Number]
Date: [Date]

Re: Tracking System Security Incident

We are reporting a security incident affecting our [Metrc/BioTrack] 
tracking system.

INCIDENT SUMMARY:
- Date/time discovered: [Date/Time]
- Type of incident: [Description]
- Systems affected: [List]
- Data potentially affected: [Description]

IMMEDIATE ACTIONS TAKEN:
1. [Action]
2. [Action]
3. [Action]

CURRENT STATUS:
- System access: [Secured/Under investigation]
- Inventory integrity: [Verified/Under review]
- Operations: [Normal/Modified procedures]

We will provide updates as our investigation progresses.

Contact: [Name, Phone, Email]


SECTION 7: SECURITY HARDENING CHECKLISTS

7.1 Initial Setup Checklist (New License)

Account Security: ☐ Admin account created with strong password (16+ chars) ☐ MFA enabled on admin account ☐ Backup codes stored securely ☐ Temporary password policy established ☐ Session timeout verified

User Management: ☐ User provisioning process documented ☐ User deprovisioning process documented ☐ Role definitions documented ☐ Least privilege principle applied ☐ Acceptable use policy created

API Security: ☐ API credentials stored in encrypted vault ☐ API rotation schedule established ☐ API monitoring configured ☐ API access limited to need-to-know

Integration Security: ☐ POS integration tested ☐ Sync monitoring enabled ☐ Error alerting configured ☐ Failover procedures documented

Documentation: ☐ All procedures documented ☐ Contact list completed ☐ Incident response plan includes tracking systems ☐ Training materials created


7.2 Ongoing Security Checklist (Daily)

Task Mon Tue Wed Thu Fri Sat Sun

Check sync status ☐ ☐ ☐ ☐ ☐ ☐ ☐

Review failed logins ☐ ☐ ☐ ☐ ☐ ☐ ☐

Review API errors ☐ ☐ ☐ ☐ ☐ ☐ ☐

Check alerts ☐ ☐ ☐ ☐ ☐ ☐ ☐

Verify inventory reconciliation ☐ ☐ ☐ ☐ ☐ ☐ ☐


7.3 Ongoing Security Checklist (Weekly)

Task Week 1 Week 2 Week 3 Week 4

Review all user access ☐ ☐ ☐ ☐

Check for security updates ☐ ☐ ☐ ☐

Review API activity logs ☐ ☐ ☐ ☐

Test backup/recovery ☐

Review terminated employee list ☐ ☐ ☐ ☐


7.4 Ongoing Security Checklist (Monthly)

Task Completed Date Notes

Full user access audit ☐

Review and update contact list ☐

Test incident response procedures ☐

Review state regulatory updates ☐

POS integration health check ☐

API credential rotation check ☐


7.5 Ongoing Security Checklist (Quarterly)

Task Q1 Q2 Q3 Q4

Rotate all API credentials ☐ ☐ ☐ ☐

Full security configuration review ☐ ☐ ☐ ☐

User training refresher ☐ ☐ ☐ ☐

Vendor security assessment ☐ ☐ ☐ ☐

Incident response tabletop exercise ☐ ☐ ☐ ☐

Policy and procedure review ☐ ☐ ☐ ☐


7.6 Annual Security Checklist

Task Completed Date Notes

Full security assessment ☐

Penetration test (if applicable) ☐

Policy comprehensive review ☐

Vendor contract review ☐

Insurance review ☐

Regulatory compliance audit ☐

Training program update ☐

Disaster recovery test ☐


SECTION 8: EMPLOYEE TRAINING MATERIALS

8.1 Tracking System Security Training Outline

Module 1: System Overview (15 minutes)

  • What is Metrc/BioTrack?
  • Why tracking matters for compliance
  • Your role in maintaining security
  • Consequences of security failures

Module 2: Account Security (20 minutes)

  • Password requirements and best practices
  • MFA setup and usage
  • Session security (logout, timeouts)
  • Recognizing phishing attempts

Module 3: Daily Operations Security (15 minutes)

  • Secure login procedures
  • Recognizing suspicious activity
  • Reporting security concerns
  • Manual tracking procedures (backup)

Module 4: What to Do If… (15 minutes)

  • You suspect your account is compromised
  • You receive a suspicious email about Metrc/BioTrack
  • The system isn’t working
  • You see something unusual

Assessment: Quiz covering key concepts


8.2 Quick Reference Guide for Employees

╔═══════════════════════════════════════════════════════════╗
║       METRC/BIOTRACK SECURITY QUICK REFERENCE            ║
╠═══════════════════════════════════════════════════════════╣
║                                                           ║
║  PASSWORD RULES:                                         ║
║  • 16+ characters minimum                                ║
║  • Never share with anyone                               ║
║  • Never write down or save in browser                  ║
║  • Change every 90 days                                  ║
║                                                           ║
║  MFA (TWO-FACTOR):                                       ║
║  • Always use it - no exceptions                        ║
║  • Keep authenticator app on YOUR phone only            ║
║  • Report immediately if phone lost/stolen              ║
║                                                           ║
║  DAILY HABITS:                                           ║
║  • Log out when stepping away                           ║
║  • Never leave logged in unattended                     ║
║  • Use only authorized devices                          ║
║  • Report anything suspicious                           ║
║                                                           ║
║  RED FLAGS TO REPORT:                                    ║
║  ⚠️ Email asking for your password                      ║
║  ⚠️ Login from location you weren't at                 ║
║  ⚠️ Records you didn't change                          ║
║  ⚠️ Sync errors or system not working                  ║
║  ⚠️ Anyone asking to use your account                  ║
║                                                           ║
║  IF SOMETHING SEEMS WRONG:                               ║
║  1. Stop what you're doing                              ║
║  2. Don't try to fix it yourself                        ║
║  3. Report to: _________________________                ║
║  4. Document what you saw                               ║
║                                                           ║
╚═══════════════════════════════════════════════════════════╝


8.3 Training Acknowledgment Form

TRACKING SYSTEM SECURITY TRAINING ACKNOWLEDGMENT

Employee Name: _________________________________

Position: _________________________________

Training Date: _________________________________

I acknowledge that I have received and understand the following:

☐ Metrc/BioTrack Security Training (Modules 1-4)

☐ Tracking System Acceptable Use Policy

☐ Password and MFA Requirements

☐ Incident Reporting Procedures

I understand that:

• I am responsible for the security of my tracking system account
• I must never share my credentials with anyone
• I must report any security concerns immediately
• Violations may result in disciplinary action up to termination
• I may be held personally liable for intentional misuse

Employee Signature: _________________________________

Date: _________________________________

Manager Signature: _________________________________

Date: _________________________________

[Retain in employee file]


SECTION 9: DOWNLOADABLE TEMPLATES

Members can download:

  • Metrc Security Configuration Checklist (Excel) - State-by-state configurations
  • BioTrack Security Configuration Checklist (Excel) - State-by-state configurations
  • User Access Management Template (Excel) - Track all users and permissions
  • API Credential Rotation Log (Excel) - Track credential lifecycle
  • Daily/Weekly/Monthly Security Checklist (PDF) - Printable checklists
  • Employee Training Slides (PowerPoint) - Customizable training deck
  • Training Acknowledgment Form (Word) - Ready-to-use form
  • Quick Reference Card (PDF) - Print for each workstation
  • Incident Response Procedures (Word) - Tracking system specific
  • Regulatory Notification Template (Word) - Ready-to-customize

[DOWNLOAD ALL TEMPLATES - ZIP]


SECTION 10: FREQUENTLY ASKED QUESTIONS

General Questions

Q: Do I really need MFA if Metrc/BioTrack doesn’t require it?

A: Yes. MFA is your single most effective protection against credential theft. Even if your state doesn’t require it, enable it anyway. The 30 seconds per login is worth avoiding a breach.


Q: How often should I rotate API credentials?

A: Every 90 days minimum, or immediately after:

  • Any employee termination (if they had API access)
  • Any suspected compromise
  • Any vendor security incident

Q: Can I use the same password for Metrc and BioTrack?

A: No. Never reuse passwords between systems. If one is compromised, all accounts with that password are at risk.


Q: What if I forget my MFA device?

A: This is why backup codes are critical. Use a backup code to access your account, then immediately set up MFA on a new device. If you’ve lost your backup codes too, contact your admin for account recovery.


Technical Questions

Q: My POS vendor says they handle all the Metrc security. Do I still need to do anything?

A: Yes. Your vendor handles their side, but you’re still responsible for:

  • Your user accounts and passwords
  • Your employees’ access
  • Monitoring and verifying sync status
  • Responding to issues
  • Regulatory compliance

Q: How do I know if my API credentials have been compromised?

A: Warning signs include:

  • API calls you didn’t initiate
  • Sync errors that resolve mysteriously
  • Data changes you didn’t make
  • Unusual API activity in logs
  • Vendor notification of suspicious activity

Q: Can former employees access Metrc after termination?

A: Not if you follow proper deprovisioning. The moment an employee is terminated:

  • Deactivate their Metrc/BioTrack account
  • Change any shared passwords they knew
  • Rotate API credentials they had access to

The most common breach vector is forgotten accounts of former employees.


Compliance Questions

Q: How long should I keep Metrc/BioTrack access logs?

A: Keep logs for at least 3 years, preferably 7 years. State regulations vary, but longer retention protects you in disputes and investigations.


Q: Do I need to report a Metrc sync failure to my state?

A: It depends on duration:

  • < 4 hours: Document internally, resolve
  • 4-8 hours: Consider notification, document thoroughly
  • 8+ hours: Notify regulator, document everything

Check your state’s specific requirements.


Q: What if I discover my inventory doesn’t match Metrc?

A: Don’t panic. Follow this process:

  • Verify with physical count
  • Investigate the discrepancy source
  • Document your findings
  • Make corrections in Metrc with proper reason codes
  • If significant (>2% or 6 units), notify regulator proactively

CONCLUSION

Your seed-to-sale tracking system is a critical compliance tool and a significant security risk.

Attackers target tracking systems because:

  • They contain valuable business intelligence
  • Compromise creates regulatory chaos
  • Many operators don’t secure them properly
  • API credentials are often poorly protected

This guide gives you:

  • Step-by-step hardening procedures
  • State-specific configurations
  • User management best practices
  • API security controls
  • Monitoring and alerting guidance
  • Incident response procedures
  • Employee training materials
  • Downloadable templates

Take action today:

  • Complete the initial setup checklist
  • Enable MFA on all accounts
  • Audit current user access
  • Implement monitoring
  • Train your team
  • Schedule quarterly reviews

Your compliance depends on it. Your license depends on it.


Related Resources: