South Africa’s public service delivery now depends on software systems that manage identity, revenue collection, healthcare, and justice administration.
When these systems fail, service delivery stops.
But the most overlooked risk is not cyberattacks or infrastructure outages.
It is software supplier failure.
And under South African regulatory frameworks such as Joint Standard 1 of 2023, this is not an IT issue.
It is a governance responsibility.
Software Dependency Is a Governance Exposure, Not a Technical Detail
Public sector systems are no longer standalone.
They depend on layered supplier ecosystems:
- Global software vendors
- Local technology providers
- Specialist developers and contractors
- Internally maintained legacy systems
Each layer introduces failure risk:
- Vendor insolvency
- Market exit
- Acquisition and product discontinuation
- Loss of key technical personnel
These are not edge cases.
They are predictable events.
The real question is not whether a supplier will fail.
The question is whether the institution retains operational control when it happens.
Loss of Control Is the Real Continuity Failure
Most continuity strategies focus on uptime.
This misses the real risk.
When a software supplier fails, institutions can lose:
- Access to source code
- Ability to maintain or patch systems
- Legal rights to intervene
- Technical capability to recover operations
The failure sequence is consistent:
- Vendor support degrades
- Issues accumulate
- Security exposure increases
- Legal escalation begins
- Service delivery deteriorates
At this point, continuity plans based on contracts alone collapse.
Because contracts do not restore systems.
Control does.
Regulatory Accountability Requires Demonstrable Recoverability
South African financial regulation is explicit.
Under Joint Standard 1 of 2023, governing bodies are responsible for:
- IT risk management
- Business continuity
- System resilience
- Recoverability of critical systems
This creates a direct accountability test:
Can the institution recover critical systems independently of the supplier?
If the answer cannot be demonstrated with evidence, the risk remains unmanaged.
Auditors do not accept intent.
They require proof.
Continuity Requires More Than Contracts
Many organisations believe contractual protections are sufficient.
They are not.
This is why organisations implement software escrow solutions with independent verification
Operational continuity requires enforceable technical capability, including:
- Access to complete and current source code
- Full technical and operational documentation
- Defined release conditions aligned to real failure scenarios
- Preservation of build environments and dependencies
- Independent verification that systems can be rebuilt and deployed
Without verification, deposits are theoretical.
With verification, they become operational recovery assets.
Why Most Software Escrow Arrangements Fail Under Pressure
Software escrow is often implemented incorrectly.
Common failure points include:
- Outdated or incomplete deposits
- No verification of usability
- Release triggers that do not reflect real-world failure events
- No ability to rebuild the system independently
In these cases, escrow exists.
But continuity does not.
Effective escrow requires:
- Continuous updating of deposited materials
- Independent technical verification
- Alignment to governance and regulatory expectations
Without this, escrow introduces false assurance.
From Risk Awareness to Operational Control
Software supplier failure is not hypothetical.
It is a known and recurring risk across public and regulated sectors.
The difference between disruption and continuity comes down to one factor:
Control.
Institutions that rely solely on supplier goodwill or contractual terms remain exposed.
Institutions that implement verified, enforceable recovery mechanisms retain control.
And in a regulated environment, control is what defines whether governance obligations have been met.
Final Position
Software escrow, when structured and verified correctly, is not a legal formality.
It is a governance control mechanism.
In an environment where public services depend on software:
Failure to secure recoverability is not an operational oversight.
It is a governance failure.
If your organisation cannot demonstrate recoverability of critical systems, the risk is already present.
Assess your exposure before it becomes a regulatory issue.
What happens if a software supplier fails?
Organisations may lose access to source code, support, and system control, resulting in operational disruption and regulatory exposure.
Is software escrow required for compliance?
Software escrow is not always explicitly mandated, but it is widely used to meet requirements for operational resilience, recoverability, and third-party risk management.
What is demonstrable recoverability?
Demonstrable recoverability is the ability to prove that a system can be rebuilt and operated independently of the original supplier.



