NEWSLETTER
January 05, 2026
Combined Authorities and local councils are facing cyber risks that are increasing in frequency, sophistication, and impact.
As digital services expand and data sharing becomes more complex, the resilience of public-sector organisations is being tested in new and increasingly visible ways.
The UK Government’s own Cyber Action Plan highlights “institutionalised fragmentation and legacy IT” as systemic weaknesses undermining public-sector cyber resilience. Nowhere are these challenges more evident than in IT governance and policy management, with fragmented, outdated policy and portfolios obscuring risk rather than helping to manage it. Over time, unmanaged IT policies become a form of governance debt: a growing accumulation of obsolete, contradictory, or poorly applied documents that weaken assurance rather than strengthen it. This phenomenon is commonly referred to as policy sprawl.
In federated structures such as Combined Authorities, policy sprawl is often inevitable without a centralised governance approach. It typically manifests in several ways:
The Department for Levelling Up, Housing and Communities (DLUHC) has previously warned that unclear risk appetite and accountability inhibit secure data sharing. That same ambiguity extends naturally into wider IT and cyber governance, as when authority and responsibility are scattered, policy becomes inconsistent and collaboration across councils turns into a legal, security, and compliance risk.
Frameworks such as the National Cyber Security Centre’s Cyber Assessment Framework (CAF) exist to provide organisations with a consistent way to assess and improve their cyber security posture. They enable teams to identify gaps, weaknesses, and areas of risk with clarity and structure.
Crucially, the CAF places policy governance at the heart of effective operational controls. However, compliance is not achieved simply by having policy documents in place. Organisations are expected, at minimum, to demonstrate that policies are:
This is where many public-sector bodies struggle as evidence collation becomes difficult because policies are:
These gaps are not trivial. The National Audit Office (NAO) has repeatedly highlighted maturity shortfalls in these foundational controls across government organisations, reinforcing that IT policy governance is not a “nice to have”, but a prerequisite for assurance.
When policies are fragmented and ineffectively unmanaged, evidence collation becomes reactive rather than routine. This drains already stretched resources and increases the risk of non-compliance at critical moments.
In practice, outdated or unclear IT policies lead to:
Local government cyber incident reporting consistently references outdated IT practices and weak governance as contributing factors. This makes policy clarity not just a theoretical requirement, but an operational necessity.
To address these risks, authorities must move beyond static document storage and adopt a structured, defensible policy lifecycle.
A robust policy lifecycle ensures that IT policies are:
Unmanaged IT policies are more than administrative clutter. They undermine an organisation’s ability to govern risk, respond decisively to incidents, and provide assurance to regulators, auditors, and senior leadership.
Protocol Policy Systems helps Combined Authorities and local government organisations reduce risk through a streamlined, cloud-based policy framework tailored to their operating environment.
Our Policy Management as a Service (PMaaS) offering is mapped to internationally recognised frameworks and standards - CAF, ISO, PCI, and others - providing a defensible foundation for cyber and information governance.
This approach:
By implementing PMaaS, often in under six weeks, authorities can close the gap between today’s fragmented governance landscape and the resilient, assured future demanded by national standards.
Find out more about our work with Combined Authorities and local government here. Or speak to a member of the team about how we can support your IT policy requirements.
Sources & References
[1] Cyber Action Plan for the Public Sector
[2] UK Government Security - Beta
[3] Local Government Cyber Security Digital Standards
[4] Cyber Assessment Framework (CAF) Guidance
[5] Digital Transformation and Cyber Security Reports
[6] Cyber 360 Framework and Resources
Explore more insights on IT policy management in local government.
From IT Policy Documents to Defensible Controls: Tackling Policy Sprawl and Strengthening Assurance
A common misconception in IT governance is that a large volume of IT policy documents equates to strong security and compliance. In practice, quantity is not quality. As policy portfolios grow without structure or ownership...
The Cost of Fragmented IT Policies: Operational Inefficiency, Cyber Exposure and Audit Burden
In the public sector, IT policy fragmentation is often dismissed as an administrative inconvenience. However, for Combined Authorities and Local Government, the reality is far more severe. The UK...
IT Policy as a Strategic Enabler: Lifecycle Management, Accountability, and Future-Proofing
The line between IT and cyber resilience and corporate risk is rapidly disappearing in the local government sector. Recent UK government publications, including the Cyber Governance Code...
PROTOCOL POLICY SYSTEMS
Fill in the form or call us on (UK) +44 845 241 0099 or (NZ) +64 9 570 2233