Cybersecurity and IT Budgeting for State and Local Governments
Executive Overview
Cybersecurity has evolved from a specialized IT function to a mission-critical governance issue for state and local governments. Ransomware attacks, data breaches, and critical infrastructure threats have made robust cybersecurity investment not optional but essential for legal compliance, stakeholder protection, and service continuity.
Yet cybersecurity budgeting remains one of the most challenging areas of government finance. Unlike traditional capital projects (a building, a fire engine), cybersecurity spending is fragmented: some costs are capital (software licenses, hardware upgrades), others are operating expenses (incident response, training, managed services). Some costs are recurring (subscriptions, annual renewals), others one-time (system architecture overhauls, cloud migration projects).
This guide provides a comprehensive framework for building, justifying, and accounting for cybersecurity and IT investments. We'll cover federal grant opportunities (CISA's State and Local Cybersecurity Grant Program), GASB 96 accounting for subscription software, the critical distinction between capital and operating costs, cybersecurity insurance strategies, FedRAMP compliance costs, and practical budget templates for common IT investment categories.
By the end of this guide, finance directors and IT leaders will have a clear playbook for budgeting cybersecurity as a strategic investment, not a grudge expense.
The Cybersecurity Landscape: Why Now?
Government Cybersecurity Threat Data
According to CISA's annual reports and the Government Accountability Office (GAO), state and local governments face escalating threats:
- Ransomware attacks on government: 2,702 publicly disclosed attacks on U.S. government organizations between January 2018 and June 2022 (IBM X-Force)
- Average cost per breach: $3.9 million per incident, including recovery, downtime, and legal/regulatory costs (IBM 2024 Data Breach Report)
- Small town vulnerability: Municipalities under 50,000 population are targeted disproportionately due to weaker defenses and limited IT budgets
- Incident response time: Average detection time is 212 days; organizations with mature cybersecurity programs detect incidents in 54 days (significantly reducing costs)
Regulatory and Legal Drivers
Beyond threat risk, governments face legal obligations:
- State data breach notification laws (all 50 states + DC have requirements) mandate notification to affected individuals and often to state attorneys general
- HIPAA and HITECH Act (if the government operates a health agency or receives Medicaid/Medicare funds): Required breach notification timelines and security safeguards
- Family Educational Rights and Privacy Act (FERPA) (school districts): Protections for student records and incident disclosure requirements
- Public Records Statutes: Ransomware attacks that destroy records can trigger legal liability for loss of public records
- Fiduciary duty: Government boards have a fiduciary duty to protect assets (data, systems, taxpayer information)
Budget Implications
The Federal Financial Management Act (31 U.S.C. § 3301) requires agencies to maintain effective internal controls, including IT security. A government that suffers a preventable breach due to insufficient cybersecurity spending may face:
- Audit findings or "management letter comments"
- Liability claims from affected citizens
- Loss of federal funding eligibility (agencies can suspend grants to non-compliant recipients)
- Reputational damage affecting municipal credit ratings and borrowing costs
Federal Cybersecurity Funding Opportunities
CISA State and Local Cybersecurity Grant Program (SLCGP)
The Bipartisan Infrastructure Law (2021) authorized $1 billion over five years (FY 2022–2026) for state and local cybersecurity improvements. The program is administered by the Cybersecurity and Infrastructure Security Agency (CISA), part of the Department of Homeland Security.
Eligibility:
- All states are eligible
- All localities (counties, cities, towns, Indian tribes) within eligible states are eligible
- Funding is awarded through a formula-based distribution to states; states then distribute to locals
Current Distribution (FY 2022–2024):
| State | FY 2024 Allocation |
|---|---|
| Texas | $18,500,000 |
| California | $17,200,000 |
| New York | $12,100,000 |
| Florida | $11,300,000 |
| Pennsylvania | $8,900,000 |
| Illinois | $8,700,000 |
| Ohio | $8,400,000 |
(Additional 43 states follow, with smaller allocations based on population and critical infrastructure presence)
Allowable Use Categories:
Cybersecurity Assessment and Planning
- Risk assessments (external penetration testing, vulnerability scans)
- Security architecture reviews
- Zero-trust model assessments
- Business continuity and disaster recovery (BC/DR) planning
Cybersecurity Training and Awareness
- Employee phishing awareness training
- Incident response drills and tabletop exercises
- Cybersecurity fundamentals training for staff and elected officials
Incident Detection and Response
- Security information and event management (SIEM) systems
- Intrusion detection/prevention systems (IDS/IPS)
- Endpoint detection and response (EDR) tools
- 24/7 security operations center (SOC) services
Cybersecurity Infrastructure
- Firewall upgrades and network segmentation
- Multi-factor authentication (MFA) implementation
- Identity and access management (IAM) systems
- Data loss prevention (DLP) tools
- Cloud security solutions
Workforce Development
- Scholarships for cybersecurity certifications (CISSP, CEH, CISM)
- Internship programs in cybersecurity careers
Application Process:
- Contact your state cybersecurity coordinator (all states have a designated CISA liaison)
- Submit a cyber risk management plan demonstrating need and alignment with CISA priorities
- Develop a project proposal with budget and implementation timeline
- Obtain local government board approval (if applicable)
- Submit to state (deadline typically fall of prior fiscal year for next-year funding)
Match Requirement: Most SLCGP grants require a 25% local match (can be in-kind staff time or equipment). Some high-risk jurisdictions may have reduced match requirements.
Other Federal Cybersecurity Funding
Homeland Security Grant Program (HSGP): Up to $4.6 billion annually for states and locals to prevent, prepare for, and respond to threats. Cybersecurity is an allowable use.
FTA and FAA Grants: Transit agencies and airports receiving federal transportation grants can allocate grant funds to cybersecurity infrastructure (e.g., backup systems for automated fare collection, SCADA security).
EPA Water Security Grants: Drinking water and wastewater systems can use EPA grants for cybersecurity upgrades to SCADA and operational technology systems.
Utilization Rate: Most governments underutilize available federal cybersecurity funding. Reasons include:
- Lack of awareness of funding availability
- Perception that grants are too complex to administer
- Insufficient internal capacity to manage a matching requirement
- Delays in securing board approval for new grant applications
Recommendation: Assign one person (finance director or IT director) to monitor CISA and OMB grant portals for cybersecurity opportunities. Many grants have rolling or semi-annual deadlines.
GASB 96: Subscription-Based Information Technology Arrangements (SBITA)
Accounting for Software Subscriptions
Traditional government IT budgeting treated software subscriptions as operating expenses (expensed annually as incurred). GASB Statement No. 96, effective for fiscal years beginning after June 15, 2022, changed this treatment for "significant" subscription-based IT arrangements.
Definition of SBITA:
A SBITA is a contract in which a government obtains control of a right-to-use (RTU) IT asset for a defined subscription term. Common examples:
- Cloud-based enterprise resource planning (ERP) systems (e.g., migrating from on-premises to Workday, SAP Cloud)
- Software-as-a-Service (SaaS) platforms (e.g., Salesforce, Microsoft 365, ArcGIS Online)
- Cybersecurity tools and platforms (e.g., Crowdstrike for endpoint protection, Splunk for security monitoring)
- Document management systems (e.g., box.com, OneDrive for Government)
- Payroll and HR systems
Not Included in SBITA:
- Hardware subscriptions (unless bundled with software)
- Consulting services or implementation support (these are expensed as incurred)
- Operating system subscriptions for individual employee computers
- Maintenance or support services (unless essential to providing control of the asset)
Recognition Model: Right-of-Use Asset and Liability
Under GASB 96, a government must recognize:
Subscription-Based Right-of-Use Asset (ROU Asset)
- Initial measurement: Sum of subscription payments over the subscription term, plus initial direct costs
- Subsequent measurement: Depreciated over the subscription term using straight-line method
Subscription Liability
- Initial measurement: PV of subscription payments, discounted at the entity's incremental borrowing rate
- Subsequent measurement: Liability is reduced as payments are made
Example: SaaS Migration
A County Parks and Recreation Department signed a 5-year SaaS contract for a cloud-based facility reservation system. The contract terms:
- Annual payment: $150,000
- Total payments: $750,000 ($150K × 5 years)
- Implementation costs (initial direct costs): $45,000
- Incremental borrowing rate (County's cost of capital): 3.5%
Initial Recognition (July 1, 2025):
First, calculate the present value of the subscription payments:
PV Factor (3-year annuity @ 3.5%): 4.515 (annuity factor)
Actually, we have 5 payments (years 1–5), so:
- Year 1 payment (due 7/1/25): $150,000 / (1.035)^0 = $150,000
- Year 2 payment: $150,000 / (1.035)^1 = $144,928
- Year 3 payment: $150,000 / (1.035)^2 = $140,030
- Year 4 payment: $150,000 / (1.035)^3 = $135,298
- Year 5 payment: $150,000 / (1.035)^4 = $130,724
- Total PV of future payments: $701,980
ROU Asset = PV of Subscription Payments + Initial Direct Costs ROU Asset = $701,980 + $45,000 = $746,980
Subscription Liability = PV of Subscription Payments = $701,980
Journal Entry (7/1/2025):
Dr. Right-of-Use Asset—SaaS Facility System $746,980
Cr. Subscription Liability $701,980
Cr. Cash / Accounts Payable $45,000
(To record SBITA for cloud facility reservation system;
initial direct costs paid in cash)
Annual Depreciation (Year 1, 6/30/2026):
Dr. Depreciation Expense—ROU Asset $149,396
Cr. Accumulated Depreciation—ROU Asset $149,396
(Straight-line depreciation over 5-year term:
$746,980 / 5 = $149,396)
Subscription Payment (7/1/2026):
Dr. Subscription Liability $146,072
Dr. Interest Expense $24,571
Cr. Cash $150,000
(Interest = $701,980 × 3.5% = $24,569, rounded)
Over the 5-year subscription term, the ROU Asset is fully depreciated, and the Subscription Liability is paid down to zero.
Budget Impact: Capital vs. Operating
The transition to GASB 96 creates a budget distinction:
Before GASB 96: 100% expensed in the year of payment ($150K/year = $750K in operating expense over 5 years)
After GASB 96:
- Depreciation expense: $149,400/year (appears in operations but is a non-cash expense)
- Interest expense: Front-loaded, higher in early years, declining in later years
- Year 1 total P&L impact: ~$173,970 (depreciation + interest)
- Asset on Balance Sheet: Capitalized as ROU Asset (improves net position at inception)
Implications for Budget Planning
Capital Planning Awareness: While SaaS subscriptions don't require council approval as "capital projects," they should be included in the entity's capital planning discussion because they create balance sheet impact.
Budget Stability: Interest expense front-loading means the first few years have higher P&L impact than simple expense recognition. Budget planners should model the P&L impact across the subscription term.
Disclosure Requirements: GASB 96 requires detailed footnote disclosure of:
- Description of SBITA
- Lease term and payment terms
- Maturity schedule of subscription liabilities (similar to debt disclosure)
- ROU Asset depreciation and accumulated depreciation
Capital vs. Operating Cost Classification
Beyond SBITA, government IT budgets face a fundamental classification question: Is an IT investment "capital" (balance sheet) or "operating" (expense)?
GASB Capitalization Threshold
GASB requires capitalization of tangible personal property (IT equipment, hardware) with:
- Unit cost ≥ $5,000 (thresholds vary by entity; many use $5,000; some use $10,000 or $25,000)
- Useful life > 1 year
This threshold applies to:
- Servers and networking equipment
- Workstations and laptops (if >$5,000)
- Printers, scanners, and peripherals
- Software-dependent hardware (e.g., cybersecurity appliances)
Frequently Misclassified Costs
| Item | Correct Classification | Reason |
|---|---|---|
| Hyperscale data center migration | Capitalized | Creates long-lived asset; useful life 5+ years |
| Annual Microsoft 365 licenses | Operating expense | Subscription under GASB 96 (special treatment) |
| Network firewall upgrade | Capitalized | Hardware asset with useful life 5–7 years |
| Managed security services | Operating expense | Services contract; no asset created |
| Incident response consulting (breach) | Operating expense | One-time service; no asset |
| Zero-trust architecture redesign | Capitalized (mixed) | Hardware/software infrastructure investment |
| Cybersecurity insurance premium | Operating expense | Insurance; not an asset |
| Disaster recovery system | Capitalized | Hardware/equipment with useful life 5+ years |
| Annual penetration testing | Operating expense | Service contract; no asset created |
| SIEM platform software | SBITA (under GASB 96) | If multi-year subscription; if purchased, capitalize |
SaaS vs. Purchased Software
A key distinction: Whether the government buys or subscribes to software changes the accounting treatment.
Purchased/Licensed Software (Perpetual License):
- Capitalized as an intangible asset
- Amortized over useful life (typically 3–5 years)
- Maintenance and support services are operating expenses
- Example: Adobe Creative Cloud bought through a perpetual site license
Subscription Software (GASB 96):
- Recognized as ROU Asset and Subscription Liability
- Depreciated over subscription term
- Example: Salesforce, Workday, Microsoft 365 (if multi-year enterprise agreement with multi-user access)
Building a Cybersecurity Reserve Fund
Why Reserves Matter
Cybersecurity is unpredictable. A zero-day vulnerability may require urgent patching or system upgrades. A breach may necessitate forensic investigation, credit monitoring services for affected residents, and incident response consulting. A ransomware attack may require paying contractors for emergency BC/DR implementation or paying an extortionist (if leadership decides—discouraged by federal authorities).
Governments with adequate reserves can respond immediately to incidents. Those without reserves face:
- Delayed detection and remediation (while seeking budget authority)
- Emergency procurement at inflated prices (less competitive bidding)
- Debt issuance costs (bonds or notes to fund emergency response)
- Service interruption (critical systems down longer while funding is arranged)
Cybersecurity Reserve Fund Targets
Best practice guidance suggests:
- Minimum: 10–15% of annual cybersecurity operations budget
- Target: 20–25% of annual cybersecurity operations budget
- Robust: 30% of annual cybersecurity operations budget
Example:
A City with a $2 million annual cybersecurity and IT budget would target:
- Minimum reserve: $200,000–$300,000
- Target reserve: $400,000–$500,000
- Robust reserve: $600,000
Funding the Reserve
- Annual appropriation: Budget $X annually to grow the reserve (e.g., $100K/year until target is reached)
- Operating surplus: If IT department operates under a cost-recovery model (charging departments for services), any annual surplus can be transferred to the cybersecurity reserve
- Grant funding: Use CISA or other federal grant funds to establish the reserve (not counted against local matching requirements if grant allows)
- One-time revenue: Use property sale proceeds, insurance recoveries, or fund balance surpluses to seed the reserve
Reserve Governance
Clearly define in reserve policy:
- Permitted uses: Emergency incident response, emergency system upgrades, forensic investigation, critical infrastructure protection
- Authorization threshold: Who can authorize reserve drawdowns? (Typically IT director up to $50K, CIO or CFO up to $250K, council for amounts > $250K)
- Replenishment timeline: After a drawdown, reserve must be restored within 12 months (through budget appropriations)
- Annual review: Validate that reserve level remains adequate; adjust target if operational scope has grown
FedRAMP Compliance: Budget Implications
If a government operates cloud systems used by federal agencies or federal grantees, FedRAMP (Federal Risk and Authorization Management Program) compliance may be required.
FedRAMP Overview
FedRAMP is a federal government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring of cloud services. Key elements:
- Assessment: Third-party assessment organization (3PAO) performs security control assessment
- Compliance: System must meet Federal Information Processing Standards (FIPS) 200 controls (same standards as federal agencies)
- Authorization: FedRAMP Program Management Office (PMO) issues authority to operate (ATO)
- Continuous Monitoring: Annual recertification required
Compliance Costs
FedRAMP compliance is expensive and often not worth pursuing for purely local/state systems. However, if a government provides cloud services used by federal grantees or operates a federal program, compliance may be necessary.
Typical FedRAMP Cost Structure:
| Phase | Cost Range | Timeline |
|---|---|---|
| Initial Assessment (by 3PAO) | $100,000–$300,000 | 4–6 months |
| Remediation & Re-testing | $50,000–$150,000 | 2–3 months |
| Initial Authorization | $25,000–$50,000 (PMO fee) | 2–4 months |
| Total Initial Compliance | $175,000–$500,000 | 8–13 months |
| Annual Continuous Monitoring | $30,000–$80,000 | Ongoing |
When FedRAMP is Required:
- Cloud service used by federal agency or federal grantees (HHS, DoD, etc.)
- Moderate or high-impact systems under FIPS 200
- Cloud infrastructure shared with federal systems
When FedRAMP is NOT Required:
- Local-government-only systems (fire, police, parks, planning)
- Low-impact systems (administrative functions, not sensitive data)
- Systems with no federal agency users
Recommendation: Before investing in FedRAMP compliance, validate the actual federal requirement. Many governments mistakenly pursue FedRAMP for systems that don't require it.
Cybersecurity Insurance: Coverage and Budget
Types of Cyber Coverage
Cyber insurance policies typically cover:
First-Party Coverage (entity's own losses)
- Business interruption (lost revenue during downtime)
- Forensic investigation (cost of incident response and damage assessment)
- Data recovery (cost to restore systems)
- Notification costs (cost to notify affected individuals of breach)
- Credit monitoring (provided to affected individuals at insurer's cost)
- Extortion demands (ransomware payment, if authorized under policy)
- Public relations (cost to hire crisis management firm)
Third-Party Coverage (liability to others)
- Breach liability (claims from affected individuals)
- Network security liability (damage caused by entity's system to others)
- Regulatory fines and penalties (covered up to policy limits)
Cyber Insurance Costs for Local Governments
Insurance costs vary dramatically based on:
- Entity size: Smaller entities (< 50K population) pay $2,000–$5,000/year
- Industry risk: Utilities and water systems pay higher premiums (critical infrastructure)
- Loss history: Entities with prior breaches pay 2–3x more
- Controls posture: Entities with strong cybersecurity controls get discounts (up to 25%)
- Coverage limits: Policies with $1M limit are cheaper than $5M or $10M policies
Sample Premium Estimates:
| Entity | Population | Annual Premium | Deductible | Limit |
|---|---|---|---|---|
| Small town | 15,000 | $2,500 | $25,000 | $1,000,000 |
| Medium city | 100,000 | $6,000 | $50,000 | $5,000,000 |
| Large metro | 500,000 | $15,000 | $100,000 | $10,000,000 |
| Water utility | 150,000 residents | $8,500 | $50,000 | $3,000,000 |
Insurance Policy Gaps
Cyber insurance does NOT typically cover:
- Acts of war or terrorism (often excluded)
- Sanctions-related losses (Iran, North Korea, etc.)
- Intentional misconduct by officers/employees
- Intellectual property infringement (alleged in cyber incident)
- Infrastructure replacement (recovery vs. replacement costs)
Best Practice: Work with insurance broker to understand exclusions and coordinate cyber insurance with other policies (general liability, directors & officers insurance).
Sample IT Budget Template
Below is a realistic IT and cybersecurity budget for a mid-sized city (population 75,000–100,000):
Annual IT Operating Budget: $2,450,000
| Category | FY 2026 | FY 2027 | FY 2028 | Notes |
|---|---|---|---|---|
| Personnel | ||||
| IT Director / CIO | $180,000 | $186,000 | $192,000 | 3% annual increase |
| IT Security Manager | $140,000 | $144,000 | $148,000 | New position FY26 |
| Network Administrators (2 FTE) | $240,000 | $247,000 | $254,000 | Existing staff |
| System Administrators (2 FTE) | $220,000 | $227,000 | $234,000 | Existing staff |
| Help Desk / Support (3 FTE) | $180,000 | $186,000 | $192,000 | Existing staff |
| Total Personnel | $960,000 | $990,000 | $1,020,000 | |
| Infrastructure & Hardware | ||||
| Server hardware & refresh | $120,000 | $125,000 | $130,000 | Planned refresh cycle |
| Network equipment (switches, firewall) | $85,000 | $90,000 | $95,000 | Cybersecurity upgrades |
| Workstations & laptops (40 units/yr) | $60,000 | $65,000 | $70,000 | Depreciation & replacement |
| Printing & peripherals | $15,000 | $15,000 | $15,000 | Maintenance level |
| Total Hardware | $280,000 | $295,000 | $310,000 | |
| Software & Subscriptions | ||||
| Microsoft 365 (SaaS) | $95,000 | $98,000 | $101,000 | 500 users × $200/user/yr |
| ERP system (SaaS - new FY26) | $140,000 | $145,000 | $150,000 | 5-year contract; GASB 96 |
| Security tools (SIEM, EDR, etc.) | $110,000 | $115,000 | $120,000 | Growing sophistication |
| GIS/mapping licenses | $35,000 | $35,000 | $35,000 | Adobe, Esri, etc. |
| Business applications | $45,000 | $47,000 | $49,000 | Specialized dept software |
| Total Software/SaaS | $425,000 | $440,000 | $455,000 | |
| Managed Services | ||||
| Managed security services (24/7 SOC) | $75,000 | $80,000 | $85,000 | Incident response support |
| Cloud backup & disaster recovery | $50,000 | $55,000 | $60,000 | Ransomware protection |
| Help desk outsourcing (after-hours) | $30,000 | $30,000 | $30,000 | Coverage outside business hrs |
| Network monitoring | $25,000 | $25,000 | $25,000 | Uptime & performance |
| Total Managed Services | $180,000 | $190,000 | $200,000 | |
| Professional Services & Training | ||||
| Security assessments & audits | $40,000 | $45,000 | $50,000 | Annual pen testing, vulnerability |
| Consulting (migrations, upgrades) | $60,000 | $50,000 | $40,000 | Declining as systems stabilize |
| Cybersecurity training | $20,000 | $20,000 | $20,000 | Awareness, certifications |
| Total Professional Services | $120,000 | $115,000 | $110,000 | |
| Insurance & Contingency | ||||
| Cyber insurance | $8,000 | $8,500 | $9,000 | Growing coverage |
| IT contingency reserve (contribution) | $75,000 | $75,000 | $75,000 | Building reserve to $500K |
| Total Insurance & Reserve | $83,000 | $83,500 | $84,000 | |
| Other | ||||
| Licenses & maintenance (miscellaneous) | $32,000 | $32,000 | $32,000 | Database, dev tools, etc. |
| Telecommunications (internet, VoIP) | $90,000 | $92,000 | $94,000 | Monthly recurring |
| Miscellaneous / contingency | $80,000 | $80,000 | $80,000 | Emergency supplies, repairs |
| Total Other | $202,000 | $204,000 | $206,000 | |
| TOTAL OPERATING BUDGET | $2,450,000 | $2,517,500 | $2,585,000 |
Capital Investments (Separate Budget)
| Item | Cost | Funding | Notes |
|---|---|---|---|
| Data center refresh (servers, storage) | $350,000 | CISA grant + local match | 3-year project |
| Network segmentation (zero-trust) | $200,000 | Local (multi-year) | Ongoing implementation |
| Disaster recovery system (backup facility) | $150,000 | Debt financing | 5-year payoff |
| Cloud migration (on-prem to Azure) | $250,000 | Operating reserves + CISA | 2-year project |
| Total Capital | $950,000 |
Total IT + Cybersecurity Budget (Operating + Capital): $3.4M over 3 years
This budget reflects:
- Realistic staffing for a mid-sized city
- Gradual increase in cybersecurity investment (new CISO position, managed SOC, enhanced tools)
- Mix of capital and operating spending
- Reserve building for incident response
- Federal grant leverage (CISA funding reduces local match)
Conclusion
Cybersecurity and IT budgeting are complex because they span capital, operating, and contingency spending; involve emerging technologies and regulatory requirements; and compete with visible services like streets and public safety.
The framework presented here helps government finance leaders:
- Leverage federal funding (CISA and other grants) to stretch limited local budgets
- Account correctly for SaaS and modern IT spending (GASB 96)
- Classify investments appropriately (capital vs. operating) for accurate financial reporting
- Build reserves for incident response without crowding the operating budget
- Manage insurance costs by investing in controls that earn premium discounts
- Plan multi-year capital investments with clear ROI justification
The government IT landscape will only grow more complex. Cybersecurity will remain a top governance priority for another decade. Finance leaders who invest in this function—and communicate its value to elected officials—will be better positioned to protect their communities and avoid costly breaches.
This article was prepared with AI-assisted research by DWU Consulting. It is provided for informational purposes only and does not constitute legal, financial, or investment advice. All data should be independently verified before use in any official capacity.