Sector Analysis

Sector Under the Microscope: Cyber Security for Local Government

> series: sector_under_the_microscope —— part: 09/10 —— sector: local_government —— data: citizen_records<span class="cursor-blink">_</span>_

Hedgehog Security 22 January 2026 12 min read

Public services. Public data. Public scrutiny.

Local councils occupy a uniquely challenging position in the cyber threat landscape. They hold vast quantities of citizen data — council tax records, housing benefit details, social services records, planning applications, electoral roll data — across hundreds of interconnected services. They operate with constrained budgets, legacy IT estates that span decades, and the knowledge that a breach will be reported by the local press and scrutinised by elected members, the ICO, and the public.

This article examines the specific threats facing UK local government, the regulatory framework, and the practical security priorities for organisations that must protect citizen data while delivering public services.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

What targets local government.

Ransomware — The Council Killer
The Redcar and Cleveland Council ransomware attack in 2020 cost an estimated £10.4 million in recovery and service disruption. Hackney Council was similarly devastated, with citizen services disrupted for months. Ransomware targeting councils is not hypothetical — it is a demonstrated, recurring, devastating threat.
Citizen Data Theft
Council databases contain comprehensive citizen records — names, addresses, dates of birth, national insurance numbers, financial information, social services records, and electoral data. A breach exposes an entire borough's population to identity theft and fraud.
Social Engineering Against Staff
Council staff — particularly those in public-facing roles (housing, benefits, social services) — are targeted with phishing campaigns impersonating government departments, elected members, and partner organisations. The high volume of legitimate external communication makes it difficult to distinguish genuine requests from social engineering.
Supply Chain Through Shared Services
Councils increasingly share IT services, platforms, and data with partner organisations — other councils, NHS bodies, social care providers, and outsourced service companies. A compromise in any partner organisation can propagate through shared infrastructure.

PSN, GDPR, and public accountability.

Framework Requirement
Public Services Network (PSN) Councils connecting to the PSN must demonstrate compliance with the PSN Code of Connection — which includes annual IT health checks (penetration testing) conducted by a CHECK or CREST-approved provider. Hedgehog Security is approved for PSN IT health checks.
UK GDPR Councils are among the largest processors of personal data in the UK. The ICO actively monitors and enforces GDPR compliance in the public sector — and has issued multiple enforcement notices to councils for inadequate security measures.
Cyber Essentials Cyber Essentials is required for central government contracts and increasingly expected at local government level. Councils also require Cyber Essentials from their suppliers — creating a cascade of certification requirements through the supply chain.
NIS Regulations / Cyber Security and Resilience Bill Councils delivering essential services may fall within scope of NIS regulations and the forthcoming Cyber Security and Resilience Bill — which will strengthen security obligations for public sector organisations.

Vulnerabilities in local government.

Our engagements with local councils and public sector organisations consistently reveal the consequences of decades of underinvestment in IT combined with rapid digital transformation — legacy systems connected to modern cloud platforms, shadow IT proliferating in service departments, and security controls that vary dramatically between different parts of the same organisation.

Finding Local Government Context
Legacy systems on unsupported platforms Line-of-business applications running on unsupported operating systems because the vendor has not migrated, the budget does not exist for replacement, or the service dependency makes migration politically difficult.
Inconsistent security across departments IT teams manage core infrastructure, but individual service departments deploy their own SaaS platforms, databases, and tools without IT oversight. Shadow IT in social services, planning, and environmental health creates unmanaged attack surface.
Excessive reliance on VPN without segmentation Remote workers connect via VPN directly to the internal network with no segmentation between services. A compromised home device has the same network access as a hardened office workstation.
Weak Active Directory hygiene AD environments that have grown organically over fifteen or twenty years — nested groups, orphaned accounts, overprivileged service accounts, and group policies that conflict with each other. Internal testing consistently reveals rapid paths to domain compromise.

Security priorities for local government.

For local councils, we recommend starting with the PSN IT health check (if PSN-connected) combined with an internal infrastructure test that focuses on Active Directory security and network segmentation. Complement this with Cyber Essentials certification and ongoing monitoring through SOC in a Box for Local Government.

The combination of annual penetration testing, Cyber Essentials certification, and continuous SOC monitoring provides a defensible security posture that satisfies PSN requirements, demonstrates GDPR compliance to the ICO, and — most importantly — protects citizen data from the threats that have already devastated other councils.


Part 10 — the final sector.

In the final article of this series, we examine the defence and engineering supply chain — the sector where Cyber Essentials Plus is not optional, where DEFCON standards apply, and where the threat actors are nation-states with unlimited budgets and patience.


CHECK and CREST-approved testing for local government.

We deliver PSN IT health checks, <a href="/penetration-testing/infrastructure">infrastructure penetration testing</a>, and <a href="/cyber-essentials">Cyber Essentials certification</a> for local councils and public sector organisations. Our reports satisfy PSN Code of Connection requirements and our testing methodology accounts for the unique constraints of public sector IT environments.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles