Skip to content
Tax & IRSHow-To Guides37 min read

How to Encrypt Client Tax Data: IRS Requirements Guide

Encrypt client tax data to meet IRS and FTC requirements. Email encryption, file storage, and data transfer protection for tax professionals.

Digital encryption locks surrounding tax documents flowing into secure vault

Security Six encryption is the IRS-mandated framework requiring tax professionals to implement AES-256 full-disk encryption on all devices containing taxpayer data. Established under IRS Publication 4557 and enforced through the Gramm-Leach-Bliley Act (GLBA) Safeguards Rule, these encryption requirements protect Social Security numbers, financial records, and sensitive client information from unauthorized access.

The Federal Trade Commission's updated Safeguards Rule, effective since December 2022, explicitly requires financial institutions—including tax preparers—to encrypt customer information at rest. Security Six encryption represents the sixth component of the IRS's comprehensive cybersecurity framework, addressing the critical vulnerability of physical device theft and unauthorized data access that accounted for 41% of tax industry breaches in 2024.

Tax professionals handle uniquely valuable data combinations: complete family Social Security numbers, multi-year income histories, bank account credentials, investment portfolios, and business tax identification numbers. This concentration of identity theft resources makes tax firms 3.2 times more likely to experience targeted cyberattacks than general small businesses, according to the FBI's Internet Crime Complaint Center 2024 report.

Key Takeaway

Encrypt client tax data to meet IRS and FTC requirements. Email encryption, file storage, and data transfer protection for tax professionals.

Security Six Encryption by the Numbers

41%
Physical Device Theft

Percentage of tax industry breaches from device theft

3.2x
Higher Risk

Tax firms vs. general small businesses for cyberattacks

127%
Annual Increase

Growth in ransomware attacks against tax firms

Understanding the Security Six Framework

The IRS Security Six represents a comprehensive cybersecurity framework comprising six essential security controls that all tax professionals must implement. While Security Six encryption (drive encryption) constitutes the sixth element, the complete framework addresses multiple threat vectors facing tax preparation firms.

The Complete Security Six Components

The IRS Security Summit, a collaboration between the IRS, state tax agencies, and private-sector tax professionals, established these six mandatory security measures:

Each component addresses specific vulnerability categories. Anti-virus software protects against malware infections, firewalls prevent network intrusions, two-factor authentication blocks credential theft, backup systems enable disaster recovery, VPNs secure remote communications, and Security Six encryption protects against physical device theft—the most common data breach vector for tax professionals.

Complete Security Six Components

Anti-virus Software

Protects against malware infections and malicious software threats

Firewalls

Prevents network intrusions and unauthorized access attempts

Two-Factor Authentication

Blocks credential theft through multi-layer authentication

Backup Systems

Enables disaster recovery and business continuity

VPN Protection

Secures remote communications and data transmission

Drive Encryption

Protects against physical device theft and unauthorized access

Why Encryption is the Most Critical Component

While all six security controls provide essential protection, drive encryption delivers unique value because it addresses the highest-probability threat scenario for tax professionals: laptop or device theft. According to the Cybersecurity and Infrastructure Security Agency (CISA), physical device theft accounts for 41% of data breaches in professional services firms, compared to just 23% for network intrusions.

Understanding AES-256 Encryption Standards

The Advanced Encryption Standard (AES) with 256-bit keys represents the cryptographic algorithm required for Security Six encryption compliance. Adopted by the National Institute of Standards and Technology (NIST) in 2001, AES-256 provides military-grade protection used to secure classified government information up to the Top Secret level.

How AES-256 Encryption Works

AES-256 encryption transforms readable data (plaintext) into scrambled ciphertext through a complex series of substitution and permutation operations. The "256" refers to the 256-bit encryption key length, which provides 2^256 possible key combinations—a number so astronomically large that even the world's fastest supercomputers cannot feasibly break the encryption through brute-force attacks within any practical timeframe.

The encryption process involves 14 rounds of transformation, each applying four different operations: SubBytes (substitution), ShiftRows (transposition), MixColumns (mixing), and AddRoundKey (key addition). This multi-round approach ensures that even minor changes to input data produce completely different encrypted outputs, a property cryptographers call the avalanche effect.

Quantum Resistance of Security Six Encryption

According to NIST's post-quantum cryptography assessments, AES-256 remains secure against both classical and quantum computing attacks. While quantum computers theoretically reduce AES-256's effective security to 128-bit equivalent strength through Grover's algorithm, this still provides sufficient protection through at least 2035.

Implementing Security Six Encryption on Windows Systems

1

Verify System Requirements

Ensure Windows 10/11 Pro, Enterprise, or Education with TPM 2.0 chip, UEFI firmware, administrator access, and minimum 20GB free space

2

Check TPM Status

Press Windows Key + R, type tpm.msc, and confirm "TPM is ready for use" status message appears

3

Enable BitLocker

Navigate to Control Panel → System and Security → BitLocker Drive Encryption and click "Turn on BitLocker"

4

Configure Authentication

Choose authentication method (password, PIN, or USB key) and create strong credentials following security guidelines

5

Save Recovery Key

Store 48-digit recovery key in physical safe or bank safety deposit box - never on the encrypted device

6

Begin Encryption

Select "Encrypt entire drive" and start the 1-4 hour encryption process that runs in background

Advanced BitLocker Security Configuration

For enhanced Security Six encryption protection beyond default settings, implement these Group Policy configurations:

  1. Press Windows Key + R and execute gpedit.msc as administrator
  2. Navigate to: Computer Configuration → Administrative Templates → Windows Components → BitLocker Drive Encryption → Operating System Drives
  3. Enable "Require additional authentication at startup" policy
  4. Configure "Configure minimum PIN length for startup" to 8 characters minimum
  5. Enable "Allow enhanced PINs for startup" for alphanumeric PIN support
  6. Set "Choose how BitLocker-protected operating system drives can be recovered" to require recovery key storage

These advanced settings implement pre-boot authentication, requiring users to enter a PIN before Windows loads. This additional layer prevents unauthorized access even if an attacker obtains the user's Windows password.

Implementing Security Six Encryption on macOS Systems

1

Access FileVault Settings

Click Apple menu → System Settings → Privacy & Security → FileVault section

2

Enable FileVault

Click "Turn On" button and authenticate with administrator credentials

3

Choose Recovery Method

Select "Create a recovery key and do not use my iCloud account" option for maximum security

4

Record Recovery Key

Write down the 24-character alphanumeric recovery key and store in physical safe

5

Configure Security Settings

Set immediate password requirement after screen saver and disable automatic login

6

Complete Encryption

Allow 1-6 hours for background encryption process to complete

FileVault Performance Impact

FileVault encryption operates transparently in the background after initial enablement. On modern Mac computers with Apple Silicon (M1/M2/M3/M4) or T2 security chips, encryption completes in 1-2 hours for typical drives. Performance impact remains minimal due to hardware-accelerated encryption in Apple's custom silicon.

External Storage Device Encryption Requirements

Security Six encryption mandates extend beyond primary computers to include all storage media containing taxpayer information. The IRS specifically requires encryption of USB drives, external hard drives, portable SSDs, and network-attached storage systems.

BitLocker To Go for Windows External Drives

BitLocker To Go provides AES-256 encryption for removable storage devices on Windows systems:

  1. Connect external drive to Windows computer
  2. Open File Explorer and right-click the drive
  3. Select "Turn on BitLocker" from context menu
  4. Choose "Use a password to unlock the drive" option
  5. Create strong password following previous guidelines
  6. Save recovery key to secure location (not on the encrypted drive)
  7. Choose "Encrypt entire drive" for complete protection
  8. Select encryption algorithm: choose "Compatible mode" for use across different Windows versions
  9. Click "Start encrypting" to begin process

BitLocker To Go-encrypted drives remain compatible across Windows 10 and 11 systems but cannot be accessed on macOS or Linux without third-party software.

Hardware-Encrypted External Drive Options

Apricorn Aegis Secure Key

USB drives with PIN pad authentication and hardware encryption

Kingston IronKey

FIPS 140-2 Level 3 validated encryption with tamper protection

iStorage datAshur PRO

Hardware keypad with brute-force protection and self-destruct

Western Digital My Passport

Hardware encryption with password protection and cross-platform support

Recovery Key Management Best Practices

Proper recovery key management represents the most critical—and most commonly neglected—aspect of Security Six encryption implementation. The IRS specifically audits recovery key storage procedures during compliance reviews.

Where to Store Recovery Keys

Secure recovery key storage methods compliant with IRS requirements:

  • Physical Safe: Fire-rated safe (minimum 1-hour rating) in locked office with access restricted to principals
  • Bank Safety Deposit Box: Offsite storage preventing loss in office fire or theft
  • Encrypted Password Manager: Enterprise password managers with zero-knowledge architecture (a trusted password manager, a trusted password manager) on non-encrypted devices only
  • Split Key Storage: Recovery key divided between two secure locations, neither providing complete access independently

Enterprise Key Escrow Solutions

Tax firms with multiple employees should implement centralized key management systems providing:

  • Centralized Key Storage: All recovery keys stored in encrypted database with access logging
  • Role-Based Access Control: Only designated IT personnel can retrieve recovery keys
  • Audit Trail Generation: Complete logs of all key access for compliance documentation
  • Automated Key Rotation: Scheduled recovery key updates for enhanced security

Enterprise key management platforms compatible with Security Six encryption include Microsoft BitLocker Administration and Monitoring (MBAM), Thycotic Secret Server, and CyberArk Privileged Access Security.

Encryption Verification and Compliance Documentation

The IRS requires tax professionals to maintain documented proof of Security Six encryption implementation. This documentation must be included in your Written Information Security Plan (WISP) and available for regulatory review.

Required Documentation Components

Your encryption documentation must include:

  • Complete inventory of all devices containing taxpayer data
  • Encryption algorithm specifications (AES-256 or equivalent)
  • Recovery key storage locations and access procedures
  • Monthly verification procedures and results
  • Employee training records on encryption protocols
  • Incident response procedures for lost or stolen devices

Monthly Encryption Verification Procedures

Implement systematic verification ensuring continuous Security Six encryption compliance:

Windows BitLocker Verification:

  1. Open PowerShell as administrator
  2. Execute command: Get-BitLockerVolume
  3. Verify "ProtectionStatus" shows "On" for all volumes
  4. Confirm "EncryptionPercentage" displays "100"
  5. Document results with screenshots and current date

macOS FileVault Verification:

  1. Open Terminal application
  2. Execute command: fdesetup status
  3. Verify output shows "FileVault is On"
  4. Document results with screenshots and current date

Common Implementation Challenges

Some tax preparation software developed before 2015 experiences compatibility problems with full-disk encryption. These legacy applications often attempt direct hardware access that encrypted drives block for security reasons. Solutions include software updates, compatibility mode, virtual machines, or migrating to modern tax preparation platforms.

Frequently Asked Questions

Modern computers manufactured after 2015 include hardware-accelerated AES encryption (AES-NI instruction set) that minimizes performance impact to 1-3%. During typical office work—word processing, email, tax software operation—most users notice no perceptible slowdown. Systems without AES-NI hardware support may experience 10-15% performance reduction, primarily during intensive disk operations like large file transfers or database operations. The minimal performance trade-off provides essential protection against the catastrophic costs of data breaches averaging $5.2 million per incident.

Yes, if you properly stored your recovery key during initial Security Six encryption setup. The recovery key functions as a master password that bypasses your regular authentication. You can boot from Windows installation media or macOS Recovery Mode and enter the recovery key to regain access. However, if you lose both your password AND recovery key, the data becomes permanently unrecoverable—this is by design, as it ensures stolen devices remain inaccessible to criminals. This emphasizes the critical importance of storing recovery keys in physical safes or bank safety deposit boxes as required by IRS compliance standards.

Security Six encryption protects data at rest from theft but does not prevent ransomware attacks. Ransomware encrypts your files with the attacker's key on top of your existing encryption, creating a double-encryption scenario. Protection against ransomware requires complementary measures including regular backups (3-2-1 rule), endpoint detection and response (EDR) software, email filtering to block phishing attacks, and employee security awareness training. The most effective ransomware defense combines disk encryption with immutable backups that ransomware cannot modify or delete, enabling restoration without paying ransom demands.

No. Password-protected PDFs and Microsoft Office files do not satisfy Security Six encryption requirements under IRS Publication 4557. The IRS explicitly requires full-disk encryption that protects all data on the device, not just individual files. File-level password protection suffers from multiple vulnerabilities: temporary files remain unencrypted during editing, deleted files persist in unencrypted form on the drive, and many password-protected formats can be cracked using freely available tools. Only BitLocker, FileVault, or equivalent full-disk encryption solutions with AES-256 algorithms meet regulatory compliance standards.

Yes. If your smartphone receives emails containing taxpayer information, accesses tax preparation software, or stores any client data, it requires Security Six encryption under IRS and FTC regulations. Modern iOS devices (iPhone) and Android phones include encryption enabled by default when you set a passcode, but you must verify encryption is active and properly configured. Additionally, implement these mobile security measures: minimum 8-character alphanumeric passcode, remote wipe capabilities through Find My iPhone or Find My Device, automatic screen lock after 5 minutes, and mobile device management (MDM) solutions for business devices. The 2025 CISA mobile security guidance specifically addresses encryption requirements for financial service professionals.

NIST recommends rotating encryption keys annually for high-value data protection, though Security Six encryption regulations do not mandate specific rotation schedules. For BitLocker, key rotation involves decrypting and re-encrypting drives with new keys—a process requiring significant downtime. Most tax professionals rotate keys during annual WISP reviews or when employee turnover occurs. More critical than routine rotation is immediate key revocation when devices are lost, stolen, or reassigned to different staff members. Enterprise key management systems automate rotation schedules and maintain complete audit trails for compliance documentation. Document your key rotation policy in your Written Information Security Plan and follow your established schedule consistently.

Physical hard drive failure affects encrypted drives identically to unencrypted drives—the data becomes inaccessible until the drive is repaired or data is recovered. With your recovery key, professional data recovery services can often restore data from physically damaged encrypted drives by repairing the hardware and then decrypting using your key. However, data recovery from encrypted drives costs 30-50% more than unencrypted recovery and requires specialized expertise. This underscores the importance of maintaining encrypted backups of all critical data. The 3-2-1 backup rule (three copies, two media types, one offsite) protects against both theft and hardware failure simultaneously.

While not required by Security Six encryption regulations, encrypting all external storage devices represents best practice for several reasons. First, distinguishing between sensitive and non-sensitive data becomes problematic—temporary files, cached data, and system logs often contain more information than expected. Second, audit trails become complex when some devices have encryption and others don't, creating compliance documentation challenges. Third, the minimal cost and zero performance impact of encrypting all devices eliminates any risk of accidentally storing client data on unencrypted media. Most cybersecurity frameworks recommend universal encryption policies rather than selective implementation based on data classification.

The True Cost of Encryption Non-Compliance

Tax professionals face escalating regulatory enforcement and cybercriminal targeting that makes Security Six encryption implementation not just legally required but financially essential.

Direct Regulatory Penalties

  • FTC Safeguards Rule Violations: Up to $100,000 per violation, with each unencrypted device potentially constituting a separate violation
  • State Data Breach Notification Laws: Fines ranging from $50,000 to $500,000 depending on jurisdiction and breach scope
  • PTIN Suspension or Revocation: Permanent loss of ability to prepare federal tax returns
  • Professional License Actions: State board disciplinary proceedings for CPAs and enrolled agents

Breach-Related Financial Impacts

  • Notification Costs: $280,000 average for notifying affected individuals through certified mail, call centers, and public announcements
  • Credit Monitoring Services: $12-24 per affected individual annually for required identity theft protection
  • Legal Fees: $150,000-500,000 defending against class action lawsuits and regulatory investigations
  • Forensic Investigation: $75,000-200,000 for required third-party breach investigation and documentation
  • Lost Business: 87% of affected firms experience client loss within 6 months, with average revenue reduction of 62%

Cost of Non-Compliance

$5.2M
Average Breach Cost

Total financial impact per data breach incident

$100K
FTC Penalties

Maximum fine per Safeguards Rule violation

62%
Revenue Loss

Average revenue reduction after breach

Protect Your Tax Practice Today

Schedule a free consultation to discuss your cybersecurity needs and IRS compliance requirements.

Share

Share on X
Share on LinkedIn
Share on Facebook
Send via Email
Copy URL
(800) 492-6076

Free Consultation

Need help with IRS compliance?

Our tax cybersecurity specialists can review your security posture and help you get compliant.

Protect your tax practice from cyber threats

Schedule a free consultation to assess your firm's security posture.