Strategy, Policy, and Analysis

Our strategy for end user device security

Learn More

This area contains reports and papers written by our team considering government policy, strategic direction of travel in implementation, and analysis of impacts and implications.

These papers have considerable informal input from colleagues across the public sector, and where possible, their efforts will be attributed. No inference should be taken that these documents represent an official view of the public sector. The documents are aimed predominantly at public sector organisations, but organisations in the media, IT security reseller, and SI communities, as well as academia, may also find benefit.

An editorial policy decision was taken that critique of policy is acceptable, but actual criticism is only levelled where we believe there is a better alternative and share that alternative in the document.

Should you have any comments, queries, or requests for further information, please contact:

James Stirk
Director Government Health & Education UK&I, Intel Security
+44 7778 162 297


PSN Overview

This document provides information on the U.K. Government’s Public Services Network (PSN). It considers topics from high-level policy and the requirements for connection, to an approach one might take to meeting compliance conditions. It is aimed primarily at public sector organisations seeking to make an application to connect to the PSN, to aid understanding the processes and requirements involved. It is also intended for suppliers to the public sector to gain an awareness of their customers’ requirements, to help them jointly find the correct solutions.

PSN Solutions Guide

The solutions guide outlines the Intel Security approach to meeting the PSN’s IA conditions using our common security platform for digital government. This guide gives an overview of how this platform provides a simple method for meeting the PSN’s IA conditions, and how your organisation can use it to help become PSN compliant. It does this in reference to the major security areas within an organisation, considering risk management, secure configuration, malware protection, boundary controls, protective monitoring, and data protection.


Additional Resources