Multi-State Operator IT: A Cannabis MSO Guide for 2026.
May 13, 2026 · 9 min read
Cannabis multi-state operators (MSOs) face IT challenges that single-state operators don't. Each state has its own regulator, its own compliance rules, its own track-and-trace system (METRC in most states, BioTrack in others), and its own data security expectations. Yet your customers, employees, and brand operate as one unified company.
This guide covers how MSOs should architect IT — networking, cybersecurity, cloud infrastructure, compliance, and operational scale — to support multi-state operations without IT becoming a barrier to expansion.
The MSO IT challenge
If you operate cannabis facilities in California, Colorado, Illinois, and Michigan, you face four IT problems simultaneously:
1. Compliance fragmentation. Each state has different surveillance retention requirements, different data security mandates, different access control rules, and different regulatory documentation expectations. California's DCC differs from Colorado's MED differs from Illinois's IDFPR differs from Michigan's MRA. Configuring IT to meet each state's specific rules — and keeping documentation current as regulations change — is a full-time effort.
2. Track-and-trace integration. Most states use METRC, but each state's METRC instance has its own API endpoint, license formats, and reporting requirements. Some states (like Washington) use BioTrack instead. MSOs need IT systems that integrate seamlessly with whichever track-and-trace system applies to each facility.
3. Centralized cybersecurity. An MSO's brand reputation depends on the security of the weakest facility. If one location gets breached, customer data from all locations may be at risk. Ransomware attackers increasingly target MSOs because they offer larger payouts than single-state operators.
4. Unified reporting and visibility. Executives need consolidated reporting across all facilities — sales, inventory, compliance status, IT health, security incidents. Without unified visibility, decision-making slows and risks compound.
Network architecture for MSOs
The foundation of MSO IT is networking. The wrong choices early create problems that compound as you expand.
Site-to-site VPN or SD-WAN. Each facility needs secure connectivity back to your corporate network for centralized management. Site-to-site VPN is the minimum; SD-WAN provides better performance, redundancy, and visibility. Either way, every facility's traffic should flow through inspected, monitored connections.
VLAN segmentation. At every facility, segment cardholder data (POS network) from surveillance, IoT, and guest WiFi onto separate VLANs. This is required for PCI DSS 4.0 compliance and recommended by NIST CSF 2.0 — and protects against lateral movement if any single network is compromised.
Centralized firewall management. Don't manage individual firewalls site-by-site. Use centralized cloud-managed firewall platforms that let you push consistent security policies, monitor all sites from one dashboard, and respond to threats across the entire footprint simultaneously.
Cybersecurity for multi-state operations
MSO cybersecurity should follow a centralized framework with consistent controls applied at every facility.
Single SOC for all sites. Don't fragment security operations by state or facility. A single Security Operations Center (SOC) monitoring all locations provides better threat correlation — an attack pattern at one facility may be the precursor to attacks at others.
NIST CSF 2.0 alignment. The NIST Cybersecurity Framework 2.0 provides a consistent baseline for cybersecurity across all sites. Federal agencies and critical infrastructure use it. No other cannabis IT framework offers comparable rigor.
Centralized identity management. Use Microsoft Entra ID (Azure AD) or equivalent to manage every employee's account from one platform. Enforce MFA on all administrative access. When an employee leaves, you disable one account and lose access to every system everywhere — instead of chasing local admin accounts at each facility.
Cannabis-specific incident response. Standard IR playbooks don't address cannabis-specific scenarios: METRC system compromise, surveillance system breach during an active state inspection, customer PII exposure with state-specific breach notification requirements. MSOs need playbooks that map response procedures to each state's data breach laws.
Cloud architecture for MSOs
MSO cloud strategy hinges on data sovereignty and federal cloud risk.
Avoid public cloud for cannabis-sensitive data. AWS, Azure, and GCP are public cloud providers subject to federal jurisdiction. Cannabis is federally illegal. While these providers don't actively delete cannabis customer accounts today, their terms of service can change, and federal subpoenas can target their data. Cannabis private cloud with explicit data sovereignty is significantly safer.
Backup architecture matters. MSO operations should follow the 3-2-1-1-0 cyber resilience standard — 3 copies of data, 2 storage technologies, 1 offsite copy, 1 immutable copy, 0 errors verified through automated recovery testing. The immutable copy is critical: if ransomware encrypts your primary systems, immutable backups give you a clean recovery path.
VDI for centralized desktops. Virtual Desktop Infrastructure (VDI) lets corporate users access centralized desktops from any facility, with all data living in the datacenter rather than on individual workstations. When laptops get lost or stolen, no data is at risk.
METRC integration across multiple states
Most states use METRC, but each state's METRC instance is independent. MSOs must:
- Configure POS integration for each state's METRC API endpoint
- Train staff on each state's METRC reporting workflows (which differ subtly)
- Implement METRC contingency plans for outages — California experienced multi-hour METRC outages in 2024-2025 that disrupted operations
- Reconcile inventory across state lines for product transfers (where legal)
- Maintain audit-ready documentation in each state's specific format
The states that don't use METRC (Washington uses BioTrack) require entirely separate integration work.
Choosing an IT partner for an MSO
MSOs benefit dramatically from cannabis-exclusive IT providers that support all your states under one contract. Look for:
- Multi-state coverage — Your IT partner should support every state where you operate without subcontracting to local providers
- One contract, one helpdesk — Fragmented support across states multiplies management overhead
- Centralized monitoring — All facilities visible from one dashboard, not state-by-state
- Standardized security policies — Consistent controls applied at every facility
- Multi-state compliance documentation — IT records in each state's required format
- Private cloud option — Data sovereignty becomes more important as your operation grows
710IT supports cannabis MSOs across all 40 legal cannabis states under one contract, with centralized monitoring, standardized NIST CSF 2.0 security policies, and unified reporting.
Operating in multiple states? Let's simplify your IT.
Schedule a free assessment. We'll review your multi-state IT, identify gaps, and show you how 710IT supports MSOs under one contract.
Book a Free Assessment →