
What IRS Cybersecurity Requirements Apply to Your Tax Practice
If you hold a Preparer Tax Identification Number (PTIN) or an Electronic Filing Identification Number (EFIN), you are legally required to meet IRS cybersecurity requirements governing how you collect, store, and transmit client tax data. These obligations come from three interlocking sources: IRS Publication 4557, the Federal Trade Commission (FTC) Safeguards Rule, and the IRS Security Six initiative. Non-compliance is not a minor administrative matter—it can result in EFIN revocation, civil penalties under the Gramm-Leach-Bliley Act (GLBA), and personal liability for data breaches affecting your clients.
Tax professionals hold some of the most sensitive personal data in any professional field. A single client file contains Social Security numbers, income records, bank account details, employer identification numbers, and dependent information—everything needed to commit identity theft, fraudulent tax refund fraud, or financial account takeover. The IRS Identity Theft Tax Refund Fraud Steering Committee documented over 294,000 confirmed tax identity theft victims in 2024 alone, with a significant portion traced back to compromised tax preparer systems rather than individual taxpayer accounts.
This guide covers every active IRS cyber security requirement as of 2026: what each mandate demands, who must comply, how to implement the required controls, and what documentation you need to demonstrate a defensible security posture to IRS auditors and FTC investigators.
The Threat Environment Facing Tax Professionals
IBM Cost of Data Breach Report 2024
Verizon Data Breach Investigations Report 2024
IRS Identity Theft Steering Committee
IRS Publication 4557: The Foundation of Tax Data Security
IRS Publication 4557, Safeguarding Taxpayer Data, is the primary IRS reference document outlining cybersecurity obligations for tax professionals. Updated regularly, it maps IRS expectations directly to the FTC Safeguards Rule and provides a checklist of administrative, technical, and physical safeguards every practitioner must implement. It applies to every PTIN holder and every firm that participates in IRS e-file through an EFIN.
Administrative Safeguards
Administrative controls govern how your firm manages security at the organizational level. Publication 4557 requires you to designate a qualified individual responsible for your information security program, conduct a written risk assessment identifying all systems that store or transmit client data, develop and maintain a Written Information Security Plan (WISP), and train all employees on data security responsibilities before granting system access. You must also maintain written procedures for adding, modifying, and terminating employee access rights.
Technical Safeguards
Technical controls are the software and hardware measures protecting client data from unauthorized access and exfiltration. Publication 4557 specifically requires multi-factor authentication (MFA) on all accounts that access client tax data—including tax software portals, email, and cloud storage. It also mandates encryption of client data at rest and in transit, automatically updated anti-malware software on all workstations, network firewalls, and secure remote access via a Virtual Private Network (VPN) when working off-site.
Physical Safeguards
Physical security receives less attention than digital controls, but Publication 4557 addresses it explicitly. Your firm must restrict physical access to devices containing client data, implement a clean-desk policy for paper tax documents, and ensure all portable media—USB drives, laptops, external hard drives—are encrypted and inventoried. When decommissioning equipment, you must use certified data destruction methods before disposal. Simply deleting files does not meet this requirement.
The IRS Security Six: Required Baseline Controls
Deploy Antivirus and Anti-Malware Software
Install endpoint security software on every device that accesses client tax data. Enable automatic updates so signature databases remain current. The IRS requires this protection on workstations and any mobile devices used for professional work. Consumer-grade antivirus does not provide the behavioral detection capabilities of enterprise Endpoint Detection and Response (EDR)—consider upgrading.
Enable a Hardware or Software Firewall
A properly configured firewall blocks unauthorized inbound and outbound network traffic. For small practices, a business-grade router with firewall capabilities is the minimum standard. Larger firms should implement next-generation firewalls with application-layer inspection and logging to satisfy FTC Safeguards Rule monitoring requirements.
Use Multi-Factor Authentication on All Accounts
MFA is now mandatory for all IRS e-Services accounts, tax software logins, and any system that accesses client financial data. Enable it on email, cloud storage, and remote access tools. Authenticator apps using time-based one-time passwords (TOTP) are preferred over SMS codes, which are vulnerable to SIM-swapping attacks.
Back Up Client Data Using the 3-2-1 Rule
Maintain three copies of data, on two different media types, with one stored off-site or in an encrypted cloud backup service. Test restoration procedures quarterly—an untested backup is an unreliable backup. Encrypted, tested backups are also your primary defense against ransomware extortion demands.
Encrypt Sensitive Files and Storage Devices
Use full-disk encryption on all laptops and workstations—BitLocker on Windows, FileVault on macOS. Encrypt all portable drives and use encrypted file transfer protocols (SFTP, HTTPS, secure client portals) when transmitting client data. Sending tax documents as unencrypted email attachments does not meet the encryption requirement under the FTC Safeguards Rule.
Create and Use a VPN for Remote Access
Any employee or contractor accessing firm systems remotely must connect through an encrypted VPN tunnel. This prevents man-in-the-middle interception on public Wi-Fi and untrusted networks. Disable split tunneling to ensure all traffic routes through the protected connection. Configure your VPN solution to require MFA at login.
Written Information Security Plan (WISP): Who Needs One and What It Must Include
The WISP requirement is not optional guidance—it is a federal obligation under Section 501(b) of the Gramm-Leach-Bliley Act, enforced by the FTC through the Safeguards Rule (16 CFR Part 314). Every tax preparer who files returns electronically or holds client financial information qualifies as a "financial institution" under GLBA, meaning the WISP mandate applies regardless of firm size. A sole practitioner filing 12 returns per year has the same WISP obligation as a regional accounting firm with 50 staff members.
The IRS reinforced this requirement through its PTIN renewal process—preparers who renew their PTIN must attest to having appropriate data security safeguards in place. EFIN holders face additional scrutiny under the e-file provider agreement (IRS Form 8633), which requires ongoing compliance with data security standards as a condition of maintaining e-file privileges.
Required Components of a Compliant Tax Professional WISP
Your WISP must address every element listed in IRS Publication 4557 and the FTC Safeguards Rule. A WISP that is missing required components is not a compliant WISP, even if it is a well-written document:
- Designated security coordinator — A named individual accountable for the information security program, with documented responsibilities
- Written risk assessment — An inventory of all systems, data flows, and threats, with documented risk ratings and remediation decisions
- Access controls policy — Role-based permissions with unique credentials for every user; no shared logins permitted
- Encryption policy — Specific algorithms and key management procedures for data at rest and in transit
- MFA policy — Which accounts require MFA and which methods are approved by the firm
- Monitoring and testing program — How the firm detects unauthorized access and tests its controls, including the frequency of vulnerability assessments
- Service provider oversight — How vendors with access to client data are vetted and contractually obligated to maintain appropriate security standards
- Incident response plan — Step-by-step procedures for detecting, containing, reporting, and recovering from a data breach
- Employee training program — How and how often all staff with client data access receive security awareness training
The IRS provides a free starting template that you can adapt to your practice—download a customizable version at our IRS WISP template PDF resource or access the fully updated 2026 WISP template for tax professionals. Understand, however, that placing your name on a generic template without customizing it to your actual systems and risk environment does not constitute a compliant WISP under the FTC Safeguards Rule.
IRS Cybersecurity Requirements: DIY vs. Managed Security Coverage
| Feature | DIY / Self-Managed | RecommendedBellator Managed Security |
|---|---|---|
| WISP Development | Generic template only | Custom WISP drafted for your practice |
| Annual Risk Assessment | Self-assessment worksheet | Formal documented assessment with findings report |
| MFA Enforcement | Manual setup per account | Policy deployment + compliance audit |
| Endpoint Protection | Consumer antivirus software | Enterprise EDR deployed and monitored |
| Encrypted Backups | Manual process, untested | Automated, encrypted, quarterly restore tests |
| Employee Security Training | Ad hoc, no documentation | Annual training + phishing simulations |
| Incident Response Plan | Generic downloaded template | Custom IRP + annual tabletop exercise |
| IRS Breach Notification Support | — | Guided response with timeline management |
| Dark Web Monitoring | — | Continuous credential and EFIN monitoring |
| Vulnerability Assessment | — | Annual assessment with remediation evidence |
The FTC Safeguards Rule: Updated Requirements Every Tax Preparer Must Meet
The FTC's updated Safeguards Rule, which took full effect in June 2023, significantly expanded the cybersecurity obligations of financial institutions—a category that explicitly includes tax return preparers under the Gramm-Leach-Bliley Act. The rule aligns closely with the NIST Cybersecurity Framework 2.0 and requires a formal, documented information security program with specific, measurable technical controls. The 2023 update goes substantially beyond prior guidance and beyond the IRS Security Six.
Specific Controls Mandated by the Updated Safeguards Rule
The rule requires these technical and operational controls, with no size-based exemptions for the core requirements:
- Access controls enforced by technical means — Limiting employee access to client data on a need-to-know basis must be implemented through system permissions, not just written policy
- Data inventory and classification — A current inventory of all systems and the client data they contain, including cloud applications, email archives, and local storage
- Encryption at rest and in transit — Specific to the updated rule: password-protecting a file is not a substitute for encryption; full-disk encryption and encrypted transfer protocols are required
- MFA on all information systems — Unlike the prior version of the rule, the 2023 update explicitly requires MFA on every system accessing client financial data, with no carve-outs for small firms
- Vulnerability management — Documented procedures for monitoring and promptly addressing new security vulnerabilities, including patch management timelines
- Annual penetration testing or vulnerability assessment — Firms with 5,000 or more client records must conduct annual penetration testing; smaller firms must conduct annual vulnerability assessments. Most solo and small-firm practices fall into the vulnerability assessment category
- Security awareness training with phishing simulations — Regular training for all personnel with access to client data, with documented completion records
- Written and tested incident response plan — Must cover detection, containment, eradication, recovery, and post-incident review
For a detailed mapping of these requirements to your practice's specific obligations, review our IRS Publication 4557 compliance guide. For incident response planning specifics, our cybersecurity incident response plan template provides a tax-professional-specific framework you can adapt and test.
Core Security Capabilities Required by IRS Standards
Multi-Factor Authentication
Mandatory on all IRS e-Services portals, tax software, email, and cloud storage accounts. The IRS-preferred method is an authenticator app generating time-based one-time passwords, rather than SMS codes susceptible to SIM-swapping.
Written Information Security Plan
A federally mandated, firm-specific security policy document required under the FTC Safeguards Rule. Must be reviewed annually and updated whenever the firm's systems, personnel, or risk environment changes materially.
Endpoint Detection and Response (EDR)
Advanced threat detection on all workstations and mobile devices accessing client data. EDR provides behavioral analysis and automated containment capabilities that consumer antivirus products cannot replicate.
Encrypted Cloud Backup
Automated, encrypted backups stored off-site protect against ransomware and hardware failure. Backup integrity must be tested by performing actual restoration—a backup you have never restored cannot be relied upon in an emergency.
Dark Web Monitoring
Continuous scanning of dark web marketplaces and breach databases for your firm's credentials, client SSNs, and EFINs. Early detection enables faster response before fraudulent returns are filed using stolen data.
Security Awareness Training
Annual training with phishing simulation testing for all staff with client data access. Phishing is the top initial access vector for tax firm breaches—documented training completion also satisfies FTC Safeguards Rule evidence requirements.
EFIN and PTIN Revocation Risk
Failure to maintain adequate cybersecurity can result in EFIN suspension or revocation. The IRS can revoke your Electronic Filing Identification Number if an investigation finds that inadequate safeguards contributed to unauthorized access to client data or fraudulent return submissions from your systems. Without an active EFIN, your practice cannot file returns electronically. Restoration typically takes 45–90 days and requires documented evidence of remediation. Protect your filing credentials with the steps outlined in our EFIN protection guide.
Employee Training and Phishing Defense: Addressing the Human Factor
The Verizon 2024 Data Breach Investigations Report confirmed that 68% of breaches involved the human element—phishing, credential theft, or accidental data exposure by staff. For tax professionals, the attack pattern is well-documented: spear-phishing emails impersonate tax software vendors, IRS e-Services, or state tax authorities, tricking employees into entering credentials on fake login pages or downloading malware disguised as W-2 forms or e-file confirmation notices.
The FTC Safeguards Rule and IRS Publication 4557 both require employee security training as a formal program element with documented completion records—not a one-time onboarding item. Effective training for tax practice staff should cover:
- Phishing recognition — How to identify and report suspicious emails, with emphasis on tax-season lures such as fake IRS notices, DocuSign attachments, and fraudulent W-2 or 1099 requests. Review our guide to phishing attacks targeting tax professionals for current attack patterns.
- Password hygiene — Use of a password manager, prohibition on credential reuse across accounts, and procedures for reporting suspected account compromise. Our guide to creating strong passwords covers the technical requirements.
- Social engineering tactics — Vishing (voice phishing), pretexting, and business email compromise (BEC) schemes targeting payroll and ACH transfers. These attacks bypass technical controls entirely by manipulating employees directly—review our social engineering defense guide for current techniques.
- Secure data handling procedures — How to transmit client documents using encrypted portals, what to do when a document is accidentally sent to the wrong recipient, and how to apply the clean-desk policy to paper tax records.
- Incident reporting — How to immediately report a suspected breach or phishing attempt to the designated security coordinator, without waiting to confirm whether data was actually accessed or stolen.
Training must be delivered at onboarding and repeated at least annually. Phishing simulation testing—controlled test emails sent by your security team or managed service provider—is the most effective method for measuring and improving actual staff behavior. Firms using phishing simulations consistently see initial click rates drop from over 30% to below 5% within 12 months of regular testing.
IRS Data Breach Reporting: Your Obligations When an Incident Occurs
If your firm experiences a data breach or suspects unauthorized access to client tax information, your reporting obligations are time-sensitive and multi-directional. The IRS requires tax professionals to report data thefts or losses affecting client tax data to the IRS Stakeholder Liaison immediately—ideally within 24 hours of discovery. This notification triggers IRS monitoring to detect fraudulent returns filed using your clients' stolen data.
Beyond the IRS, a breach event triggering the FTC Safeguards Rule may require parallel notifications to affected clients, state attorneys general (virtually every state has independent breach notification laws with their own timelines), and the FBI Internet Crime Complaint Center (IC3). The IRS's identity theft guidance for tax professionals outlines the full response sequence:
- Contact your IRS Stakeholder Liaison to report the incident
- File a complaint with the FBI's IC3 at ic3.gov
- Report to your state tax agency if state returns are affected
- Notify affected clients in writing with specific details about what data may have been exposed
- Work with your cybersecurity provider to contain the incident, preserve forensic evidence, and remediate the root cause before restoring systems
Building a Compliance Documentation File
IRS auditors and FTC investigators evaluating your cybersecurity program look for documented evidence—not just attestations that controls exist. Build and maintain a compliance evidence file that includes your signed and dated WISP with version history, employee training completion records with dates and course content, risk assessment worksheets with documented findings and remediation decisions, vendor contracts with data security addenda for all service providers handling client data, penetration test or vulnerability assessment reports with remediation evidence, MFA enrollment records for all staff, and an incident log documenting all security events including phishing attempts and near-misses.
Firms with thorough, organized compliance documentation consistently achieve faster resolution and reduced penalties in regulatory investigations compared to those relying on verbal descriptions of their security posture. If you have experienced a ransomware event affecting client data, our ransomware protection guide for tax practices covers both prevention and post-incident obligations specific to this attack type.
Get a Free IRS Cybersecurity Compliance Assessment
Bellator Cyber Guard specializes in helping tax professionals meet every IRS cybersecurity requirement—from WISP development and MFA deployment to employee phishing training and incident response planning. Schedule a no-cost assessment to find out exactly where your practice stands and what you need to do before tax season.
Frequently Asked Questions: IRS Cybersecurity Requirements
Yes. Any individual or firm that prepares federal tax returns for compensation and holds a PTIN must comply with IRS cybersecurity requirements as outlined in IRS Publication 4557. The FTC Safeguards Rule applies to all tax professionals who handle client financial information under the Gramm-Leach-Bliley Act, with no size-based exemption. A sole practitioner filing 12 returns has the same WISP and MFA obligations as a firm with 50 employees.
Operating without a WISP violates the FTC Safeguards Rule, which carries civil penalties of up to $50,120 per violation per day. The IRS can also use the absence of a WISP as grounds for EFIN revocation following a data security incident. Beyond regulatory penalties, the lack of a WISP means your firm has no documented procedures for managing an incident, which significantly worsens outcomes when a breach does occur. Download a starting point at our IRS WISP template PDF resource.
The FTC Safeguards Rule (as updated in 2023) requires MFA on every information system that accesses client financial data—not just IRS e-Services. This includes tax preparation software, practice management platforms, email accounts, cloud storage (Dropbox, OneDrive, Google Drive), and all remote access tools. The IRS Security Six lists MFA as a baseline requirement across all platforms used in tax practice. There are no carve-outs for smaller systems or less frequently used accounts.
Your WISP must be reviewed and updated at least annually. You should also update it whenever there is a material change in your risk environment—adding a new employee, adopting new tax software, migrating to cloud systems, or experiencing a security incident. The FTC Safeguards Rule requires your WISP to reflect the actual current state of your security program. Dating your WISP to a prior year without updating it is treated as non-compliance during an audit.
The IRS Security Six—antivirus software, a firewall, MFA, data backups, drive encryption, and a VPN—represents the minimum floor of IRS cybersecurity requirements, not the ceiling. Full compliance also requires a written WISP tailored to your practice, an annual risk assessment, documented employee security training, a tested incident response plan, vendor oversight procedures, and an annual vulnerability assessment. These additional requirements come from the FTC Safeguards Rule and are independently enforced from IRS Publication 4557 obligations.
Yes. If your firm experiences unauthorized access to client tax data, you must contact your IRS Stakeholder Liaison as quickly as possible—the IRS recommends within 24 hours of discovery. You should also file a complaint with the FBI's Internet Crime Complaint Center (IC3), report to your state tax agency if state returns are affected, and provide written notification to affected clients. Most states have independent breach notification laws with their own timelines that run concurrently with IRS reporting obligations. A tested incident response plan is essential for meeting these overlapping deadlines.
IRS Publication 4557 and the FTC Safeguards Rule both require encryption of client data at rest and in transit. For data at rest, full-disk encryption on all laptops, workstations, and portable drives meets the standard—BitLocker on Windows and FileVault on macOS are the most common implementations. For data in transit, all file transfers and communications containing client tax information must use encrypted protocols (TLS 1.2 or higher, SFTP, or a secure client portal). Sending tax documents as standard email attachments, even in a password-protected ZIP file, does not satisfy the encryption requirement. See our tax document encryption requirements guide for full implementation specifics.
The IRS provides a free WISP template as a starting point, and Bellator Cyber Guard offers an updated version at our 2026 free WISP template page. However, a template placed on your letterhead without customization does not constitute a compliant WISP under the FTC Safeguards Rule. Your WISP must reflect your actual systems, employee roles, data flows, and specific risks. A solo preparer working from a home office with one laptop has a different risk profile than a firm with shared network drives and multiple staff—and the WISP must document the actual, specific controls in place at your practice.
Penalties operate on multiple parallel tracks. The FTC can impose civil monetary penalties under the Gramm-Leach-Bliley Act for Safeguards Rule violations, with per-violation-per-day exposure reaching tens of thousands of dollars. The IRS can revoke your EFIN, ending your ability to e-file returns until documented remediation is complete—a process that typically takes 45–90 days at minimum. State attorneys general can impose additional penalties under state data breach and privacy laws. Affected clients can pursue civil litigation for damages resulting from a breach. The total financial exposure from a single breach event typically far exceeds the cost of implementing the required controls in advance.
Bellator Cyber Guard provides end-to-end cybersecurity services built specifically for tax professionals. Our services address every IRS cyber security requirement: custom WISP development, formal risk assessments, MFA deployment and audit, Endpoint Detection and Response (EDR) installation, encrypted backup configuration, dark web monitoring for credentials and EFINs, annual vulnerability assessments, employee phishing simulation training, and incident response plan development with tabletop testing. We also provide compliance documentation packages to demonstrate your security posture to IRS auditors or FTC investigators. Contact us or schedule a free assessment to get a clear picture of where your practice stands and what steps you need to take before the next filing season.
Free Consultation
Need help with IRS compliance?
Our tax cybersecurity specialists can review your security posture and help you get compliant.



