Industry Insights

State and local government software supply chain in 2026

StateRAMP, election infrastructure, court case management, and the budget-versus-risk gap that defines software supply chain security for state and local agencies.

Hritik Sharma
Security Engineer
7 min read

The software stack that runs an American state or local government is unlike any other vertical because it spans an enormous range of mission criticality, vendor consolidation, and budget reality simultaneously. The same county clerk's office that uses Tyler Technologies for case management also uses a tax assessment system from a vendor with twelve employees, also uses a property records system whose codebase was last meaningfully refactored before the iPhone shipped, and also uses an election management system from one of three federally certified vendors whose lineage traces back to the 2002 Help America Vote Act procurement cycle. The aggregate is a supply chain whose risk profile changes block by block within the same building.

The funding model for state and local IT compounds the problem. Federal grants have surged through CISA's State and Local Cybersecurity Grant Program, but the underlying operational budgets that pay for ongoing software maintenance are tied to property tax revenue and state appropriations that move slowly. A county that received a hundred thousand dollars to harden its election infrastructure may still be running a decade-old version of its court case management system because no grant covers that operational upgrade. Adversaries notice the gap.

What is StateRAMP and what is it actually doing?

StateRAMP is a nonprofit-administered framework modeled on FedRAMP that standardizes security expectations for cloud services sold to state and local governments. It exists because the federal FedRAMP authorization process is too expensive and too slow for vendors targeting the SLED market, and because state procurement officers needed a common bar they could write into contracts. The framework has authorized status levels that range from Ready to Provisional to Authorized, and a growing number of states either reference StateRAMP in procurement or require it outright for certain categories of cloud service.

The supply chain implications of StateRAMP are real but limited. The framework focuses on the cloud service provider's own controls, including their handling of subservice organizations, but it does not require deep SBOM transparency or component-level continuous monitoring. A vendor with a StateRAMP Authorized status is meaningfully better than an unauthorized peer, but the authorization does not by itself protect the state from a transitive dependency vulnerability in a library the vendor pulls into its build. Procurement officers who treat StateRAMP as the finish line for supply chain risk are setting their agencies up for incidents that the framework was never designed to catch.

How is election infrastructure software supply chain managed in 2026?

Election infrastructure occupies a strange position in the public sector supply chain landscape. The Election Assistance Commission certifies voting systems through the Voluntary Voting System Guidelines, currently VVSG 2.0, and CISA has designated election infrastructure as critical infrastructure since 2017. Despite that elevated status, the actual software running on election management systems is a mix of vendor-controlled application code, third-party libraries, and operating system components whose patch cadence is constrained by certification requirements. A patch that fixes a CVE in a library may require recertification of the whole system, which is expensive enough that vendors delay patches until they can be bundled.

The recertification friction creates a window where known-vulnerable software is running on systems that everyone agrees are critical. The EAC and the major vendors have been working on a more flexible interpretation of the recertification rules that distinguishes security patches from functional changes, and CISA's election security cooperative has been pushing SBOM transparency among the certified vendors. The progress is real, but the on-the-ground reality in most counties is that election management software is updated infrequently and that the chain of custody for those updates is brittle. State and local election officials need to know what their vendors ship, what dependencies are in scope, and what the patch latency looks like for each component.

What is the state of court case management security?

Court case management systems are the operational backbone of state judiciaries, and they have been a recurring target for both criminal ransomware groups and nation-state actors interested in disrupting legal proceedings. Tyler Technologies is the largest vendor in the space and was itself the victim of a serious 2020 incident that affected internal systems and customer deployments. Other large vendors include Thomson Reuters in the form of C-Track, Equivant, and Journal Technologies, and a long tail of smaller regional vendors that serve specific state court systems.

The supply chain risk in court CMS deployments is multilayered. The vendor's own codebase has the obvious risk, but the integration surface is what tends to cause incidents in practice. Court systems integrate with sheriff's office records, prosecutor case management, public access portals, and electronic filing services from third parties like Tyler's own File and Serve product, JusticeText, and a variety of state-run e-filing platforms. Each integration is a credential, a data flow, and an opportunity for an attacker who has compromised one endpoint to pivot into the court's data. Courts in 2026 need a continuous view of that integration surface that does not depend on the vendor's annual SOC 2 report to refresh.

How does the budget-versus-risk gap actually get closed?

The State and Local Cybersecurity Grant Program has distributed hundreds of millions of dollars across 2022 through 2026, and the funding has materially improved the basic security hygiene of agencies that previously had no security program at all. The structural problem is that the grants are short cycles and the operational liabilities are long cycles. An agency that uses a grant to buy a vulnerability scanner needs to fund the staff or service to actually triage the findings for the next decade, and the grant does not pay for that.

The closing pattern that has worked in agencies with strong CIOs has been to use grant funding to build the kind of continuous supply chain monitoring that scales with vendor count rather than with staff count. A small county with two IT staff cannot conduct annual vendor reviews of fifty vendors, but it can subscribe to a continuous risk feed that surfaces the three vendors this month that warrant a conversation. That model also produces the kind of evidence that NACo, NASCIO, and state auditors increasingly want to see when they evaluate whether the agency's grant spend was reasonable. The gap is not closed by spending more; it is closed by spending differently.

How Safeguard Helps

Safeguard provides state and local agencies with continuous supply chain monitoring across the specific vendor surface that defines public sector technology, with TPRM scoring tuned to vendors like Tyler Technologies, Granicus, Esri, Workday, NEOGOV, and the long tail of regional vendors that serve courts, elections, and constituent services. Griffin AI watches SBOM transparency, vulnerability disclosure feeds, and StateRAMP authorization status changes for vendors in the agency's inventory and surfaces what needs attention this week rather than this year. Policy gates can require minimum attestation and patch cadence for any system that handles election data, court records, or financial transactions, blocking the slow drift toward end-of-life software that defines so much public sector risk. The audit trail Safeguard produces is the kind of evidence a state auditor or a CISA grant compliance review will ask for, and it gives a small IT team the scale of oversight they would otherwise need a much larger budget to achieve.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.