Sector profile
Government breaches cost $2.83M on average. Per record, $134.
IBM's 2025 government figure of $2.83M is the lowest of any tracked sector. Per-record cost of $134 is also the lowest, reflecting that government records are typically not monetisable as fraud assets and that public-sector entities do not face customer churn or stock-price impact. The headline understates national-security risk: an OPM-class breach produces a 30-year intelligence asset for the adversary, not a quarterly earnings event.
Avg total cost
$2.83M
IBM CODB 2025
Per record
$134
Lowest of tracked sectors
YoY change
+1%
Flat year-over-year
Procurement cycle
6-18mo
Vendor remediation timeline
Section GV.1
Why the headline figure underweights national-security impact
IBM's cost methodology measures the four cost categories of detection-escalation, notification, post-breach response, and lost business. For a federal agency, the "lost business" category is largely zero (agencies do not lose customers to competitors), and the notification cost is amortised through existing communication infrastructure rather than triggering Experian-class commercial-vendor expense. The result is a per-record cost roughly one-third the healthcare figure. That arithmetic is correct for the four IBM categories. It is wrong as a representation of total breach impact, because national-security cost does not fit the framework.
The OPM 2015 breach is the canonical example. OPM disclosed $133M in direct cost across the breach and follow-on identity-monitoring contracts. The national-security cost is not in that figure. The breach exposed SF-86 background-investigation files for 21.5 million current and former federal employees, contractors, and their family members. The SF-86 form requires complete personal history including 10-year residence record, foreign travel history, financial history, and the names and contact details of relatives and close associates. For Chinese intelligence services, the SF-86 dataset represents a structured database of every American with a security clearance and every person with whom that American has a meaningful relationship. The intelligence value is permanent. The cost is unquantifiable in dollars but real for 30 years.
For state and local government, the cost asymmetry runs the opposite direction. State unemployment-insurance agencies and motor-vehicle departments hold SSN, driver-licence, and benefit-claim data that is highly monetisable. The 2020 wave of unemployment-fraud incidents driven by COVID-era benefits expansion produced single-state losses in the billions. California EDD alone disclosed $30B+ in fraudulent claims paid in 2020-2021, with breach-adjacent identity-theft as a major contributor. The IBM figure does not capture these costs because EDD is not classified as a sector-tracked organisation.
Section GV.2
FISMA, FedRAMP, and the procurement bottleneck
The Federal Information Security Modernization Act (FISMA, originally 2002, reauthorised 2014) is the foundational federal cybersecurity statute. FISMA requires every federal agency to maintain an information-security programme aligned to NIST SP 800-53, conduct annual assessments, and report to the Office of Management and Budget. Penalties for FISMA non-compliance are administrative rather than monetary, but a poor FISMA grade frequently triggers budget consequences during the appropriations process the following year.
FedRAMP is the cloud-specific compliance regime layered on top of FISMA, governing cloud-service providers that wish to sell to federal agencies. FedRAMP Authorisation runs Low, Moderate, and High impact baselines, with sponsorship by an agency or by the FedRAMP Joint Authorisation Board. Initial authorisation cost runs $250K to $2M for a typical SaaS vendor, plus 12 to 24 months of calendar time. Continuous monitoring cost runs $200K to $800K annually thereafter. The cost flows downstream to government customer pricing rather than appearing on government balance sheets, but it is real cost-of-cybersecurity attributable to government regulation.
CISA (the Cybersecurity and Infrastructure Security Agency, established 2018) operates the federal civilian-agency operational coordination function and issues binding Emergency Directives when a vulnerability or active threat requires immediate response. CISA Emergency Directive 21-01 following SolarWinds required all federal civilian agencies to disconnect SolarWinds Orion within hours. The directive system creates an enforcement mechanism that FISMA itself lacks, and it produces real cost: each Emergency Directive typically triggers $1M to $10M of unplanned response and remediation cost across federal civilian agencies in aggregate.
Section GV.3
Notable government breaches
Office of Personnel Management (OPM), 2014-2015
21.5M SF-86 records / Chinese intelligence / Vendor-cleared dwell time
$133M+ direct
The most consequential federal breach in US history by national-security impact. Chinese intelligence-affiliated actors gained access to OPM's networks through contractor credentials in 2014, exfiltrating SF-86 background-investigation files for 21.5 million federal employees, contractors, and family members over the following 12 months. OPM disclosed $133M in direct cost across breach response and follow-on identity-monitoring contracts with ID Experts. The House Oversight Committee report documented the failures in detail. The OPM CIO Donna Seymour resigned during congressional testimony.
Primary source: House Oversight Committee report 7 September 2016; OPM Inspector General reports 2015-2016.
SolarWinds federal agency impact, 2020
Treasury, Commerce, State, DHS, DOJ, Energy, NIH / Supply-chain / Russian SVR
$200M+ federal
The SolarWinds Orion update was distributed to approximately 18,000 customer organisations, with federal civilian agencies disproportionately represented. CISA Emergency Directive 21-01 required immediate disconnection. Federal agency remediation cost across Treasury, Commerce, State, DHS, DOJ, Energy, NIH, and others was estimated at $200M+ in direct cost. The cost flowed through agency operating budgets rather than a supplemental appropriation, with corresponding pressure on FY22 and FY23 cybersecurity line items.
Primary source: CISA Emergency Directive 21-01 18 December 2020; Senate Intelligence Committee briefings 2021; GAO Report 22-104746.
Microsoft Exchange Online (Storm-0558), 2023
State Dept + Commerce mailboxes / Stolen MSA signing key / Chinese intelligence
CSRB-investigated
A China-affiliated actor obtained a Microsoft consumer signing key and used it to forge authentication tokens for Exchange Online mailboxes at the State Department and Commerce Department. The Cyber Safety Review Board (CSRB) reviewed the incident and published a public report in March 2024 strongly critical of Microsoft's security culture and engineering practices. The CSRB report became a watershed in federal procurement, with the Department of Defense subsequently demanding Secure Future Initiative commitments from Microsoft and other large vendors. Direct dollar cost is undisclosed; the structural cost shows up in tightened federal procurement requirements and contract terms.
Primary source: CSRB report published 2 April 2024; Microsoft 8-K disclosures 2023-2024.
Section GV.4
The procurement-bottleneck cost driver
The single most under-appreciated government breach-cost driver is procurement velocity. A commercial organisation that discovers a breach can sign an incident-response retainer with Mandiant or CrowdStrike within hours and have on-site IR within 24 hours. A federal agency that discovers a breach has to either invoke an existing IDIQ contract (if one is in place and IR is in scope) or initiate a sole-source justification with corresponding contract paperwork that typically runs 7 to 30 days even on an expedited basis. The detection-escalation cost line consequently runs higher in absolute terms relative to total breach size, and the dwell time of the attacker is longer.
The General Services Administration has expanded the Schedule 70 (now Multiple Award Schedule IT category) coverage of cybersecurity IR services materially since 2018 to address exactly this gap. The CISA-led FedScope IR vehicle (announced 2023) is intended to reduce procurement-cycle time for federal incident response to 48 hours. As of 2026 the early evidence is encouraging but the procurement-cycle premium remains a real cost driver.
For state and local government, the procurement constraint is typically more severe because state procurement statutes frequently require RFP competition for any IT contract above a low threshold ($25K to $250K typical). The Maine 2024 ransomware response is a recent case study: the state had to invoke an emergency-procurement statute to engage IR vendors within 72 hours, with subsequent legislative review of the emergency invocation.
Cross-references
Cost / Forensics
→IR vendor rates and engagement-scope economics.
Regulation / SEC Item 1.05
→Public-company disclosure rules. Does not apply to federal but informs federal contractor obligations.
Cost / Per record
→$134 for government vs $408 healthcare, full sector table.
Index / All industries
→All 10 IBM sectors ranked.
Index / By country
→US-vs-non-US regulatory variance.
Schedule F / Reference Q&A
Frequently Asked Questions
Primary source:Government sector cost figures from IBM Cost of a Data Breach Report 2025. FISMA, FedRAMP, and CISA Emergency Directive data from official agency publications. Notable breach data from House Oversight Committee reports, Senate Intelligence Committee briefings, GAO reports, and the CSRB Microsoft Exchange Online review.