NEWSLETTER
January 19, 2026
In the public sector, IT policy fragmentation is often dismissed as an administrative inconvenience.
However, for Combined Authorities and Local Government, the reality is far more severe.
The UK latest Government’s Cyber action plan highlights fragmentation as a key operational risk, creating systemic gaps that lead to failed audits, slower incident response, and potential compliance costs.
And as the UK transitions into a new regulatory era with the Cyber Security and Resilience Bill (2025/26), the price of "institutionalised fragmentation" is set to rise. Meaning authorities need to act.
IT security policies are the bridge between high-level governance and day-to-day operations. When this bridge is fractured, with different departments or councils following legacy versions, auditors are forced into "Interpretation Mode."
Instead of a streamlined review, auditors find:
This doesn't just increase audit time; it escalates findings and raises red flags for regulators like the Local Audit Office (LAO) and the ICO.
During a cyber incident, policies are there to provide your baseline security detail. If policies are outdated or inconsistent, the consequences are likely to be immediate:
Fragmentation also amplifies operational inefficiency, particularly in environments already facing digital skills shortages. As noted by the NAO, reliance on “tribal knowledge” where only a few individuals know how processes really wors, creating hidden costs:
To move from fragmentation to resilience, authorities must adopt a Defensible Governance model. This includes:
By addressing the fragmentation, authorities can not only enhance the ability manage staff behavioural expectations with clarity, govern risk and respond decisively in a crisis, but also give confidence to regulators, auditors and senior leadership.
Protocol Policy Systems’ Policy Management as a Service (PMaaS) is engineered to eliminate the costs of fragmentation:
Our approach not only transforms your governance into a strategic asset that reduces costs and strengthens resilience.
Find out more about our work with Combined Authorities and local government here. Or talk to one of our team to see how we can support your IT Policy requirements.
Explore more insights on IT policy management in local government.
Hidden Risks and Policy Sprawl: How Outdated IT Policies Undermine Assurance and Cyber Resilience in Combined Authorities
Combined Authorities and local councils are facing cyber risks that are increasing in frequency, sophistication, and impact. As digital services expand and data sharing becomes more complex...
From IT Policy Documents to Defensible Controls: Tackling Policy Sprawl and Strengthening Assurance
A common misconception in IT governance is that a large volume of IT policy documents equates to strong security and compliance. In practice, quantity is not quality. As policy portfolios grow without structure or ownership...
IT Policy as a Strategic Enabler: Lifecycle Management, Accountability, and Future-Proofing
The line between IT and cyber resilience and corporate risk is rapidly disappearing in the local government sector. Recent UK government publications, including the Cyber Governance Code...
PROTOCOL POLICY SYSTEMS
Fill in the form or call us on (UK) +44 845 241 0099 or (NZ) +64 9 570 2233