🔒 MEMBER EXCLUSIVE — This guide is the definitive security reference for licensed cannabis dispensaries. Bookmark it. Share it with your operations and compliance teams. Use the checklists as living documents in your security program.


How to Use This Guide

Security at a licensed cannabis dispensary operates across four interconnected domains — Physical Security, Cybersecurity, Information Security (InfoSec), and Privacy Compliance — and a failure in any single domain creates cascading vulnerabilities across all the others. A robbed vault is a physical security failure. A breached POS system that exposed customer medical data is simultaneously a cybersecurity failure, an InfoSec failure, and a privacy compliance failure with regulatory and litigation consequences.

This guide covers all four domains in a single, actionable framework. Each section contains a detailed checklist formatted for practical use by operations managers, IT leads, compliance officers, and owners. Where applicable, regulatory citation context is provided. Items marked 🚨 Critical represent requirements that, if unmet, create immediate license risk, regulatory liability, or serious breach exposure.

Cannabis Business Security Tools | cannabisrisk.diyComprehensive security tools, checklists, and compliance resources for cannabis businesses. Estimate breach costs, audit PoS, review vendor security, and more.cannabisrisk.diy


DOMAIN 1: PHYSICAL SECURITY

Physical security is the foundation that all other security programs build on. Most states mandate specific physical security standards as a condition of cannabis licensure, but smart operators build well beyond the minimum.

1.1 Perimeter and Exterior Security

  • 🚨 Conduct a formal facility risk assessment documenting crime levels in the area, exterior access points, sight-line vulnerabilities, parking and queuing areas, window and door placements, and neighboring business risks​
  • Install commercial-grade exterior lighting covering all entry points, parking areas, dumpster locations, and delivery zones — no dark pockets​
  • Secure all exterior doors with commercial-grade deadbolt locks rated ANSI Grade 1 or higher
  • Install ballistic-resistant glazing or window film on customer-facing windows where required by state regulations
  • Implement perimeter fencing or barrier systems to prevent vehicle ramming in high-risk locations​
  • Post required exterior signage per state cannabis regulations — including “No Loitering” and restricted access notices
  • Conduct regular exterior lighting audits — burned out bulbs are a physical security gap​
  • Establish a relationship with local law enforcement — notify them of your location, hours, and cash handling procedures

[SSAE 16/18 Physical Security Assessment ToolEvaluate and document physical security controls for SSAE 16/18 compliance with our comprehensive assessment framework.![](

1.2 Surveillance System Requirements

  • 🚨 Deploy HD cameras (minimum 1080p) at every external entry and exit point, parking lot coverage, interior sales floor, vault/safe room, cash handling areas, and all Limited Access Areas​
  • 🚨 Ensure 24/7 continuous recording with timestamp overlay and low-light/night vision capability at all exterior cameras​
  • 🚨 Maintain minimum 90-day footage retention — many states require this as a licensing condition; some require longer​
  • Store surveillance footage on-premises with encrypted backup — cloud-only storage creates dependency risk if internet connectivity is disrupted​
  • Restrict surveillance system access to authorized personnel only with documented access logs
  • Ensure camera placement captures facial features at all entry points for identification purposes​
  • Test all cameras monthly and document tests — non-functioning cameras at time of incident create regulatory and liability exposure
  • Implement AI-powered video analytics for loitering detection, after-hours intrusion alerts, and crowd monitoring in waiting areas​
  • Establish a documented protocol for providing footage to law enforcement or regulators upon request​

1.3 Access Control Systems

  • 🚨 Define and document Limited Access Areas (LAAs) — all spaces containing cannabis product, cash, or cultivation equipment — with posted signage per state requirements​
  • 🚨 Assign unique access credentials to every authorized employee — no shared keycards, no shared PIN codes​
  • Deploy electronic access control (keycard, PIN, or biometric) at all LAA entry points with timestamped entry/exit logs
  • Implement a visitor management protocol: all non-employees sign in, are issued temporary credentials, and must be escorted in restricted areas at all times​
  • Establish a formal credential deactivation procedure: employee credentials must be deactivated within 1 hour of termination or resignation​
  • Conduct quarterly audits of access credential lists — remove stale credentials for inactive employees or contractors
  • Lock all back offices, inventory prep rooms, IT server rooms, and delivery intake areas at all times when not in use​
  • Document all lost or stolen key cards with immediate deactivation and incident logging​
  • Evaluate weapon detection systems (AI-powered scanners or security gates) at entry points for high-risk locations​

1.4 Cash Handling and Vault Security

  • 🚨 Install a commercial-grade vault or safe rated TL-15 or higher for overnight cash storage
  • Establish documented cash handling procedures — count, bag, log, and secure cash with two-person verification at each step​
  • Limit the number of employees authorized to access the vault — document each authorized individual
  • Use a time-delay locking mechanism on the vault to deter robbery
  • Schedule armored car pickups on a randomized, unpredictable schedule — avoid patterns observable from the exterior
  • Install a cash counting machine in a room with camera coverage and restricted access
  • Never discuss vault combinations, cash pickup schedules, or cash amounts on unsecured communications channels
  • Train all staff on robbery response protocols: comply, do not resist, activate silent alarm if safely possible, and immediately notify law enforcement​

1.5 Alarm Systems

  • 🚨 Install a monitored alarm system covering all exterior access points, interior motion detection, and vault/safe area with 24/7 professional monitoring service​
  • Install glass break sensors on all exterior windows
  • Deploy panic buttons at the point-of-sale counter, manager’s office, and vault room — test monthly
  • Ensure the alarm system has cellular backup so that cutting phone/internet lines does not disable it
  • Maintain a documented alarm response protocol — who gets called, in what order, with what information
  • Document all alarm events including false alarms — regulators may request this history during license renewal​

DOMAIN 2: CYBERSECURITY

Cybersecurity is the fastest-evolving compliance frontier in cannabis in 2026. With Schedule III reclassification arriving, federal cybersecurity frameworks are applying to cannabis operators for the first time. This section covers the full operational hardening checklist.

2.1 Network Architecture

  • 🚨 Segment your network into separate VLANs for each functional category: POS systems, surveillance cameras, guest/patient WiFi, seed-to-sale systems, administrative computers, and IoT/HVAC devices
  • 🚨 Never allow your POS network to share a VLAN with your administrative or internet-facing systems — the STIIIZY breach exploited poorly segmented POS infrastructure​
  • Deploy a business-grade firewall (not consumer hardware) with IDS/IPS (Intrusion Detection/Prevention System) capability
  • Disable all unused network ports — physically and in your firewall configuration
  • Implement separate, password-protected WiFi networks for staff, patients/customers, and IoT devices
  • Hide your primary operational SSID from broadcast — it should not be discoverable by default
  • Conduct quarterly network audits documenting all connected devices, open ports, and active services​
  • Log all network traffic at the firewall level with minimum 90-day retention for incident investigation capability

2.2 Endpoint Security

  • 🚨 Deploy EDR (Endpoint Detection and Response) software on every computer, server, tablet, and POS terminal — traditional antivirus is insufficient for modern threats​
  • Enable full-disk encryption on all endpoints (BitLocker for Windows, FileVault for Mac) — a stolen laptop with encrypted storage is a manageable incident; without encryption it’s a breach​
  • Enforce automatic OS and software updates across all endpoints — documented patch management policy required​
  • Disable autorun on all USB ports — USB-borne malware is a common initial access vector in retail environments
  • Deploy Mobile Device Management (MDM) on all company-owned tablets, phones, and handheld scanners used for delivery or inventory​
  • Enable remote wipe capability on all mobile devices used for business operations
  • Restrict copy/paste, screen capture, and local storage of sensitive data on devices used in patient consultations or medical record access​

2.3 Identity and Access Management

  • 🚨 Enforce Multi-Factor Authentication (MFA) on every system — POS admin, seed-to-sale platforms, email, cloud services, banking, and any remote access
  • 🚨 Implement Role-Based Access Control (RBAC) — every employee has the minimum permissions necessary for their job function; no shared admin accounts​
  • Require unique usernames and strong passwords (minimum 14 characters, complexity required) for every system
  • Deploy a Password Manager at the organizational level — eliminate password reuse and Post-it note credentials
  • Conduct monthly access permission reviews — remove or downgrade access for role changes, extended leave, or termination within 1 hour​
  • Implement just-in-time privileged access for administrative functions — no standing admin accounts for routine operations​
  • Maintain a user access log: who was granted access to what system, when, by whom, and when access was revoked

2.4 POS and Seed-to-Sale System Security

  • 🚨 Segment POS systems on their own isolated VLAN — POS terminals should not be able to communicate with anything outside their required connections​
  • Change all default vendor credentials on POS hardware and software immediately upon installation
  • Disable all unused services, ports, and features on POS systems
  • Enable encryption for all POS data at rest and in transit — confirm this in writing with your vendor​
  • 🚨 Secure all METRC/BioTrack API keys in an encrypted secret management system — never stored in plaintext, never hardcoded in scripts​
  • Rotate METRC/BioTrack API keys quarterly or immediately upon any suspected exposure
  • Assign minimum-necessary permission scopes to each API key — a reporting key should not carry transfer authorization
  • Require SOC 2 Type II attestation from your POS vendor and seed-to-sale software provider — request updated attestations annually​
  • Conduct daily backups of all seed-to-sale compliance data to encrypted, offline storage​
  • Monitor POS and seed-to-sale systems for anomalous activity: large bulk exports, off-hours access, unusual user behavior​

2.5 Ransomware and Backup Defense

  • 🚨 Implement the 3-2-1-1 backup rule: 3 copies of data, on 2 different media types, 1 offsite, 1 offline/air-gapped​
  • Test backup restoration quarterly — an untested backup is not a backup, it is a hope​
  • Ensure air-gapped backups are physically disconnected from your network — in 2025, nearly 98% of ransomware attacks specifically targeted backup systems​
  • Maintain offline copies of all seed-to-sale compliance data, customer records, and financial records that can be restored within hours of an incident
  • Deploy email filtering with anti-phishing and malicious attachment scanning on all business email accounts
  • Implement application allowlisting on critical systems — only pre-approved software can execute​
  • Create a ransomware-specific incident response runbook: who does what in the first 2 hours, first 24 hours, and first 72 hours of a confirmed ransomware event​

2.6 Vendor and Third-Party Security

  • 🚨 Audit every third-party vendor that accesses your systems or customer data — POS, loyalty platforms, analytics, METRC integrations, delivery apps, and marketing tools​
  • Require all vendors handling customer or patient data to sign a Data Processing Agreement (DPA) — get it in writing
  • Require SOC 2 Type II attestation or equivalent security certification from every vendor with system access
  • Include 24-hour breach notification obligations in all vendor contracts — not 72 hours, not “timely” — 24 hours​
  • Conduct annual vendor security reviews — don’t assume the vendor you vetted in 2024 maintained those standards in 2026
  • Audit every third-party tracking pixel, analytics tag, and marketing SDK deployed on your website and patient portal — each one is a potential unauthorized data exfiltration channel​
  • Maintain a complete vendor inventory: who has access to what data, under what legal agreement, and when that agreement was last reviewed

DOMAIN 3: INFORMATION SECURITY (InfoSec)

Information security is the discipline of managing your data itself — how it’s classified, stored, transmitted, retained, and destroyed. For cannabis operators, this is where compliance risk and security risk most directly intersect.

3.1 Data Classification and Inventory

  • 🚨 Build and maintain a complete data inventory — document every category of data you collect, where it originates, where it is stored (including which vendor systems), how long you retain it, and who can access it​ Classify all data by sensitivity tier:

  • Tier 1 — Critical: Medical cannabis patient records, SSNs, government IDs, qualifying diagnoses, physician certifications, financial account data

  • Tier 2 — Sensitive: Purchase histories, loyalty program data, geolocation records, employee records, METRC compliance data

  • Tier 3 — Internal: General business records, vendor contracts, operational documents

  • Tier 4 — Public: Marketing content, public pricing, general website content

  • Apply security controls proportionate to data sensitivity — Tier 1 data requires encryption, MFA-gated access, and strict retention limits​

  • Document your data classification policy and train all employees on which data falls into which category

3.2 Encryption Standards

  • 🚨 Encrypt all Tier 1 and Tier 2 data at rest using AES-256 or equivalent — no exceptions for databases, file servers, or cloud storage containing patient or financial data​
  • 🚨 Enforce TLS 1.2 or higher for all data in transit — reject connections from systems offering only TLS 1.0 or 1.1​
  • Implement end-to-end encryption for all internal communications involving sensitive patient or financial data
  • Manage encryption keys with a dedicated key management system — keys should never be stored alongside the data they protect
  • Rotate encryption keys annually and immediately upon any suspected key compromise
  • Confirm encryption standards with every cloud vendor storing your data — get it in writing as part of your DPA

3.3 Data Minimization and Retention

  • Implement a formal data minimization policy — collect only the data strictly necessary for each specific, disclosed purpose​
  • Do not retain government ID scan data beyond the regulatory requirement for age verification — scan and discard where state law permits
  • Establish documented data retention schedules for every data category: how long it is kept, where, and what secure deletion method is used at end of retention​
  • Implement automated retention enforcement where possible — systems that flag data for deletion at the end of its retention period rather than relying on manual review
  • Separate compliance-required records (seed-to-sale data legally mandated by state regulators) from marketing CRM data — never use regulatory compliance data for secondary marketing purposes without explicit consent​
  • Conduct quarterly data purge audits — identify and securely delete data with no remaining legal retention obligation

3.4 Audit Logging and Monitoring

  • 🚨 Enable comprehensive audit logging on every system containing sensitive data — logs must capture who accessed what, when, from where, and what action was taken​
  • Store audit logs in a tamper-evident, append-only system — logs that can be edited by the same administrators they’re auditing are not logs, they’re theater
  • Retain audit logs for a minimum of 2 years — this is required under most state cannabis regulatory frameworks and is a litigation necessity​
  • Deploy a SIEM (Security Information and Event Management) system or equivalent to aggregate logs from all systems and alert on anomalous patterns​
  • Configure automated alerts for: large bulk data exports, off-hours administrative access, failed MFA attempts, and new API connections to seed-to-sale systems​
  • Review audit logs weekly for anomalies — monthly is too infrequent to catch active intrusions before they cause catastrophic damage

3.5 Secure Development and Integration Practices

  • Require security review before deploying any new third-party integration, website plugin, or analytics tool​
  • Conduct quarterly audits of all active website tracking scripts, pixels, and SDKs — remove any that lack proper consent authorization or serve no current business purpose
  • Implement a formal change management process for any modification to systems that store or process sensitive data
  • Maintain a software asset inventory — know every application running on every device in your organization
  • Apply security patches within 30 days of release for non-critical vulnerabilities, and within 72 hours for critical vulnerabilities

3.6 Incident Response Planning

  • 🚨 Maintain a documented, tested Incident Response Plan (IRP) that specifically addresses the cannabis operational context — regulatory notification obligations, METRC data corruption scenarios, patient data breach notification​
  • Designate an Incident Response Team with clearly assigned roles: Incident Commander, Legal/Compliance Lead, IT Lead, Communications Lead
  • Maintain an up-to-date contact list: state cannabis regulator breach notification contacts, state AG/privacy authority contacts, legal counsel, cyber insurance carrier, forensic investigator on retainer
  • Know your state breach notification deadlines — they range from 30 to 90 days and are triggered from the date of discovery, not the date of breach​
  • Conduct a tabletop incident response exercise at least once per year — walk your team through a realistic breach scenario​
  • Maintain cyber liability insurance with coverage appropriate to the sensitivity of your data — confirm your policy covers regulatory defense costs, not just breach notification expenses
  • Test your backups as part of your incident response drill — confirm you can actually restore operations from your backup systems within your target recovery time

DOMAIN 4: PRIVACY COMPLIANCE

Privacy compliance in 2026 is no longer a legal formality — it is a fully operational requirement with direct financial and license consequences for non-compliance.

  • 🚨 Implement explicit opt-in consent for all collection and processing of sensitive personal information — medical cannabis data requires affirmative opt-in, not passive opt-out, under virtually every applicable state privacy law​
  • Create layered consent flows that treat health-related data separately from general marketing data at the point of collection
  • Maintain timestamped, auditable consent records — capture what the consumer consented to, when, through what mechanism, and from which device/IP address​
  • Ensure consent revocation mechanisms are as simple as the original consent process — one-click unsubscribe, one-step data deletion request​
  • Implement consent refresh protocols when: your data use purposes change, new vendors are added, a breach occurs, or state law requirements change
  • Include complete vendor disclosure in your consent notices — patients must know which third parties will receive their data before they consent​

4.2 Consumer Rights Fulfillment

Build and document a process for responding to consumer rights requests within legally required timelines (typically 30–45 days depending on state):​

  • Right to Know what data you hold

  • Right to Delete personal data

  • Right to Correct inaccurate data

  • Right to Opt-Out of data sales or sharing

  • Right to Data Portability

  • Designate a staff member responsible for receiving, logging, and responding to consumer privacy requests

  • Train frontline staff to recognize and immediately escalate consumer privacy requests — a budtender receiving a verbal data deletion request must know what to do​

  • Implement a system to honor deletion requests while preserving data legally required for cannabis regulatory compliance — these obligations co-exist and must be reconciled systematically​

4.3 Privacy Notices and Policies

  • 🚨 Maintain a current, accurate, and conspicuous Privacy Policy on your website, patient portal, and in-store on request — it must reflect your actual data practices, not aspirational ones​
  • Update your Privacy Notice whenever: a new vendor is added who receives customer data, a new data category is collected, applicable state law changes, or a breach notification requires communication
  • Medical dispensaries integrating with healthcare systems must maintain an updated HIPAA Notice of Privacy Practices — the February 16, 2026 HIPAA/SUD integration deadline has passed; confirm your NPP is current​
  • Post state-mandated privacy disclosures in your physical dispensary location where required by applicable state cannabis regulations
  • Ensure your loyalty program terms and enrollment flows explicitly disclose all data uses and third-party sharing

4.4 HIPAA Compliance (Medical Dispensaries)

  • Determine your HIPAA covered entity status — if you accept insurance or exchange healthcare data with covered entities, HIPAA directly applies​
  • Conduct a formal HIPAA Security Risk Analysis — required annually and after any significant change in operations or systems​
  • Designate a HIPAA Privacy Officer and HIPAA Security Officer — these can be the same person in smaller operations but must be formally designated​
  • Execute Business Associate Agreements (BAAs) with every vendor that handles protected health information (PHI) — including your POS vendor, loyalty platform, EHR system, and any analytics tool that touches patient data​
  • Implement HIPAA-required minimum necessary standard — employees should access only the PHI required for their specific job function​
  • Maintain HIPAA-compliant audit logs for all PHI access — a minimum 6-year retention requirement applies to HIPAA documentation​
  • Ensure your breach notification procedures satisfy both HIPAA’s 60-day notification requirement and your applicable state’s potentially shorter timeline — the shorter timeline governs​

4.5 State Privacy Law Compliance Matrix

For each state where you operate or serve customers, confirm the following:

  • Identify the applicable comprehensive state privacy law (CPRA, VCDPA, CPA, CTDPA, TDPSA, IDPL, KCDPA, RIDPA, etc.)
  • Confirm whether medical cannabis data qualifies as sensitive personal information under that state’s definition — it does in virtually all twenty active frameworks
  • Confirm whether opt-in or opt-out consent is required for sensitive data — opt-in is required in most states for health data
  • Verify the business threshold for applicability — Rhode Island’s law activates at just 35,000 consumers​
  • Confirm breach notification timeline for that state — ranges from 30 to 90 days
  • Confirm whether a private right of action exists — California (CPRA), Washington (MHMD), and others allow individual consumers to sue without waiting for state AG action​
  • Document your compliance posture for each applicable state in a Privacy Program document

4.6 Employee Privacy and HR Data Security

  • Apply the same data minimization principles to employee data as to patient/customer data — collect only what HR operations require​
  • Secure employee records (Social Security numbers, background check results, health information, I-9 documents) in encrypted, access-controlled systems with strict permission scoping
  • Train HR personnel on state-specific employee privacy rights — California, Colorado, and several other states extend their consumer privacy laws to employees​
  • Establish background check data retention and destruction policies — background investigation files should not be retained indefinitely after hiring decisions
  • Document your employee offboarding security checklist: credential revocation, return of company devices, remote wipe of MDM-enrolled personal devices, and access log review to confirm deactivation

DOMAIN 5: STAFF TRAINING AND SECURITY CULTURE

No security program survives contact with an untrained workforce. The most sophisticated technical controls in the world are bypassed by a single employee who clicks a phishing link.

5.1 Security Awareness Training

  • 🚨 Conduct mandatory security awareness training for all staff at hire and annually thereafter — document completion​

  • Include cannabis-specific threat scenarios: fake METRC compliance emails, state regulator impersonation, social engineering by individuals posing as vendors or law enforcement​

  • Conduct simulated phishing exercises at least quarterly — realistic scenarios that mirror actual attacks targeting cannabis operators​ Train all staff to recognize and respond to:

  • Phishing emails and SMS (smishing)

  • Pretexting and social engineering calls

  • Tailgating and physical intrusion attempts

  • Insider threat indicators

  • Establish a clear, no-blame reporting process for security concerns — employees who fear punishment for clicking a suspicious link will delay reporting, turning a manageable incident into a catastrophic breach​

  • Test your staff on dispensary-specific robbery protocols annually — response procedures, silent alarm activation, interaction compliance, post-incident documentation​

5.2 Role-Specific Training

  • Budtenders/Frontline Staff: Privacy request recognition and escalation, POS security (no unauthorized access, screen privacy), ID verification procedures, robbery response, cash handling protocols
  • Management/Supervisors: Incident reporting authority, media/law enforcement communication protocols, access credential management, seed-to-sale discrepancy escalation
  • IT/Operations: Patch management procedures, backup testing, vendor security review process, METRC API key management, network segmentation maintenance
  • Compliance Officers: Breach notification timelines by state, regulatory disclosure requirements, documentation retention obligations, consumer rights request fulfillment
  • Executive/Ownership: Cyber insurance review, security budget justification, regulatory penalty exposure understanding, executive phishing (spear phishing/whaling) awareness

DOMAIN 6: COMPLIANCE DOCUMENTATION AND AUDIT READINESS

A security program that cannot be documented and demonstrated is not a security program — it is an intention. Regulators, insurers, and courts all require documentary evidence.​

6.1 Core Policy Documents (Every Dispensary Must Have)

  • Written Information Security Policy (WISP) — the master document describing your entire security program, reviewed and updated annually​
  • Acceptable Use Policy — governing how employees use company technology and data
  • Incident Response Plan — with specific cannabis regulatory notification procedures​
  • Data Retention and Destruction Policy — with retention schedules by data category​
  • Vendor Management Policy — security requirements for all third-party relationships​
  • Access Control Policy — governing user provisioning, permission levels, and credential deactivation
  • Privacy Policy (public-facing) — accurate, current, and conspicuously posted
  • HIPAA Notice of Privacy Practices (medical dispensaries) — updated as of February 2026 requirements​
  • Physical Security Plan — required for state cannabis licensure in most jurisdictions, covering all items in Domain 1​

6.2 Ongoing Compliance Activities and Cadence

ActivityFrequencyOwnerSecurity awareness trainingAnnual (+ at hire)HR/CompliancePhishing simulationQuarterlyIT/SecurityNetwork auditQuarterlyITVendor security reviewAnnualComplianceBackup restoration testQuarterlyITPenetration testAnnualExternal vendorAccess permission auditMonthlyIT/HRCamera system testMonthlyOperationsAlarm system testMonthlyOperationsPrivacy policy reviewAnnual (or upon change)Legal/ComplianceHIPAA Security Risk AnalysisAnnualComplianceWISP review and updateAnnualCISO/OwnerIncident response tabletopAnnualAll leadership

6.3 Annual Penetration Testing

  • 🚨 Engage a qualified external vendor for an annual penetration test covering network, application, and physical social engineering vectors​
  • Provide the penetration tester with a scope that includes: POS systems, seed-to-sale integrations, patient portal, loyalty platform, and network perimeter
  • Require a written report with CVSS-scored findings and remediation guidance
  • Track remediation of all high and critical findings within 30 days of report delivery
  • Retain penetration test reports for a minimum of 3 years — they are documentation of your security due diligence in litigation and regulatory investigations

QUICK REFERENCE: The Top 10 Non-Negotiables

If your security program is just getting started, prioritize these ten controls above all others. They represent the minimum viable security posture for a licensed cannabis dispensary in 2026:

  • 🚨 Network segmentation — POS, surveillance, and patient systems on separate VLANs
  • 🚨 MFA on every system — no exceptions, no workarounds
  • 🚨 Encrypted databases — all patient and financial data encrypted at rest and in transit
  • 🚨 Air-gapped backups — tested quarterly, with documented restoration procedures
  • 🚨 Unique access credentials — every employee, every system, no sharing
  • 🚨 Vendor DPAs with breach notification — every vendor touching your data, in writing, 24-hour notification
  • 🚨 Opt-in consent architecture — for all medical/sensitive data, rebuilt from passive opt-out
  • 🚨 METRC/BioTrack API key management — encrypted, rotated, minimum permissions, monitored
  • 🚨 Written Incident Response Plan — with regulatory notification contacts for every state you operate in
  • 🚨 Annual penetration test — by an external, qualified vendor, with tracked remediation

This guide is updated quarterly by the cannasecure.tech team. Member access includes downloadable policy templates, state-specific compliance matrices, vendor security questionnaire templates, and access to our cannabis cybersecurity community. For a personalized security gap assessment for your dispensary, contact our team.