0

Table of Contents

Security six vpn configuration guide for IRS compliance and tax professionals

A security six vpn is a Virtual Private Network solution that meets the specific encryption, authentication, and access control requirements outlined in the IRS Security Six framework—a mandatory set of cybersecurity controls for tax professionals handling nonpublic personal information (NPPI). The IRS Security Six, detailed in Publication 4557, requires all tax preparers with a Preparer Tax Identification Number (PTIN) to implement six critical safeguards, with VPNs serving as the primary mechanism for securing remote access to client data. Non-compliance carries penalties up to $10,000 per incident under IRS regulations, potential loss of e-file privileges, and exposure to data breach costs averaging $4.88 million according to IBM’s 2024 Cost of a Data Breach Report. According to the FTC Safeguards Rule, financial institutions and tax professionals must encrypt all data in transit when accessing client information remotely.

A properly configured security six vpn accomplishes this by creating an encrypted tunnel between remote devices and practice networks, ensuring that Social Security numbers, bank account details, tax returns, and other sensitive financial data remain protected from interception—whether employees work from home, coffee shops, or client offices. The IRS mandates AES-256 encryption or equivalent for all remote access connections to systems containing taxpayer data, with multi-factor authentication (MFA) required per IRS Publication 1075. The NIST Cybersecurity Framework identifies VPNs as essential components of the “Protect” function, specifically for securing communications channels and controlling access to critical assets—directly aligning with IRS requirements.

Regulatory Requirement: The IRS Security Six framework establishes minimum cybersecurity standards through six mandatory controls: antivirus software, firewalls, two-factor authentication, backup procedures, drive encryption, and Virtual Private Networks. Non-compliance can result in fines exceeding $100,000 per violation under the Gramm-Leach-Bliley Act.

Understanding the IRS Security Six VPN Mandate

The IRS Security Six framework establishes minimum cybersecurity standards for tax professionals through six mandatory controls that work together to protect nonpublic personal information. Tax professionals face unique cybersecurity challenges because they aggregate massive volumes of sensitive financial data during tax season—a single compromised remote connection can expose hundreds or thousands of client records. The VPN requirement specifically addresses the risks inherent in remote access scenarios—when tax preparers connect to office networks from external locations or access cloud-based tax software over public internet connections.

According to Verizon’s Data Breach Investigations Report, over 80% of hacking-related breaches involve compromised or weak credentials, making VPN implementation with multi-factor authentication critical for protecting NPPI during remote work sessions. The CISA Telework Essentials Toolkit provides detailed guidance on VPN selection and hardening that directly supports IRS compliance efforts.

Why VPNs Are Mandatory for Tax Professionals

Unlike general business VPN usage, tax professional VPN implementations must meet specific regulatory standards that go beyond consumer-grade privacy tools. The IRS requires business-grade solutions with documented security controls, service level agreements, and compliance features specifically designed to protect taxpayer information.

  • Encryption Strength: The IRS requires AES-256 encryption as the minimum standard for data in transit. Consumer-grade VPNs using weaker encryption protocols fail to meet compliance requirements and expose practices to regulatory penalties.
  • Authentication Requirements: Multi-factor authentication must protect VPN access, preventing credential-based attacks. The FTC Safeguards Rule now mandates MFA for all remote access to systems containing customer information, making this a legal requirement rather than a best practice recommendation.
  • Kill Switch Functionality: Automatic disconnection features must prevent unencrypted data transmission if the VPN tunnel fails—critical for protecting NPPI during unstable connections. Without kill switches, devices revert to sending data unencrypted over regular internet connections when VPNs drop.
  • Logging and Monitoring: Practice administrators must maintain access logs showing who connected to practice networks and when, satisfying IRS audit requirements. While VPN providers should maintain no-logs policies for privacy, internal practice systems must document all remote access events.
  • Documentation: Your Written Information Security Plan (WISP) must document VPN policies, approved use cases, and technical specifications. Learn more about WISP requirements for tax professionals.

⚠️ Compliance Warning

Consumer VPN services marketed for streaming or general privacy do not meet IRS Security Six requirements. Tax professionals must implement business-grade VPN solutions with documented security controls, or risk penalties up to $100,000 per violation under the Gramm-Leach-Bliley Act. Additionally, practices may lose e-file privileges and face state-level sanctions for non-compliance with federal data protection standards.

Technical Requirements for Security Six VPN Compliance

Implementing a compliant security six vpn requires understanding specific technical controls mandated by IRS publications and federal security standards. Tax professionals must select VPN solutions based on encryption protocols, authentication methods, and security features that align with federal requirements rather than consumer-focused marketing claims.

Encryption Protocol Selection

The encryption protocol determines how your VPN secures data in transit. Not all protocols meet IRS standards for protecting taxpayer information. The NSA and CISA joint guidance on selecting and hardening remote access VPNs explicitly recommends IKE/IPsec-based systems over custom-coded SSL/TLS implementations, citing superior security auditing and standards compliance.

ProtocolEncryption StandardIRS CompliantBest Use Case
OpenVPNAES-256 with OpenSSL✅ YesCross-platform compatibility, maximum security
WireGuardChaCha20 with Poly1305✅ YesMobile devices, high-speed file transfers, battery efficiency
IKEv2/IPsecAES-256 with IPsec✅ YesAutomatic reconnection, network switching, mobile work
L2TP/IPsecAES-256 (when configured)⚠️ ConditionalLegacy systems, fallback option only
PPTPMPPE-128 (outdated)❌ NoNever use—known vulnerabilities

CISA’s 2023 analysis of VPN security incidents found that 73% of VPN breaches exploited unpatched vulnerabilities in outdated client software—emphasizing the importance of selecting providers with automatic update mechanisms and strong patch management practices. Tax professionals should verify their VPN provider maintains current software versions and deploys security patches within 24-48 hours of critical vulnerability disclosure.

Multi-Factor Authentication Integration

IRS Publication 1075 mandates multi-factor authentication for all remote access systems containing federal tax information. Your security six vpn must integrate with MFA solutions that provide strong authentication beyond traditional passwords. The FTC Safeguards Rule reinforces this requirement, making MFA legally mandatory for financial services firms and tax professionals.

  • Time-Based One-Time Passwords (TOTP): Apps like Google Authenticator or Microsoft Authenticator generate rotating codes that supplement passwords—preventing credential theft from compromising VPN access. TOTP codes expire every 30 seconds, making stolen credentials useless after brief windows.
  • Hardware Security Keys: FIDO2-compliant devices (YubiKey, Titan Security Key) provide phishing-resistant authentication by requiring physical possession of the key. Hardware keys cannot be stolen remotely and resist phishing attacks that compromise software-based authentication methods.
  • Push Notifications: Mobile app approvals (Duo Mobile, Okta Verify) allow users to approve or deny connection attempts in real-time. Push notifications provide context about connection attempts, including geographic location and device information, helping users identify unauthorized access attempts.
  • Biometric Authentication: While convenient, biometric methods should supplement—not replace—other factors due to potential false positives and inability to revoke compromised biometric data. Fingerprints and facial recognition add user convenience but lack the security guarantees of hardware tokens or TOTP codes.

For comprehensive guidance on implementing MFA across your practice, review our article on two-factor authentication for tax professionals.

💡 Pro Tip

Configure your VPN client to require MFA at every connection attempt rather than remembering devices. While less convenient, this prevents unauthorized access if a laptop is stolen or compromised—a critical protection for mobile tax preparers who frequently work from various locations during tax season. The additional 10-15 seconds for MFA verification provides substantially better security than device-based trust models.

Kill Switch and DNS Leak Protection

Two technical features distinguish compliant security six vpn solutions from consumer products: kill switch functionality and DNS leak protection. Both features prevent data exposure during VPN connection failures or misconfigurations.

Kill Switch Functionality: If your VPN connection drops due to network instability, the kill switch immediately blocks all internet traffic until the encrypted tunnel is reestablished. Without this feature, your device reverts to sending data unencrypted over your regular internet connection—potentially exposing NPPI during the gap. IRS audits specifically verify kill switch implementation in practice VPN configurations. According to CISA guidance, kill switches represent mandatory rather than optional features for organizations handling sensitive financial information.

DNS Leak Protection: Domain Name System (DNS) queries translate website names into IP addresses. Even with an active VPN, misconfigured systems may send DNS requests outside the encrypted tunnel, revealing which IRS portals, tax software sites, or client service providers you’re accessing. Compliant VPN solutions route all DNS queries through the encrypted tunnel, preventing ISPs or network administrators from monitoring your activity. DNS leaks compromise confidentiality even when data payloads remain encrypted.

Test your VPN configuration using tools like DNSLeakTest.com to verify that DNS requests show only your VPN provider’s servers—never your ISP or local network. Perform these tests monthly to ensure configuration changes or software updates haven’t compromised DNS leak protection.

Remote Access VPN vs. Site-to-Site VPN for Tax Practices

Tax professionals can deploy two primary VPN architectures depending on practice structure and workflow requirements. Understanding the differences between Remote Access VPN and Site-to-Site VPN helps practices select appropriate solutions for their specific operational needs.

Remote Access VPN (Client-to-Site)

This configuration connects individual devices—laptops, tablets, smartphones—to your practice’s internal network through VPN client software. Remote Access VPNs are ideal for distributed workforces and mobile professionals. Implementation requires VPN client software on each device plus either a hardware VPN appliance at your office or a cloud-based VPN service.

  • Solo Practitioners: Secure access from home offices, client locations, or while traveling. Solo practitioners benefit from cloud-based VPN services that eliminate hardware infrastructure requirements.
  • Small Practices (2-10 Staff): Each team member installs VPN client software and connects to a central VPN server (either self-hosted or cloud-based). Centralized management consoles allow administrators to provision accounts, enforce policies, and monitor connections.
  • Seasonal Workers: Temporary staff during tax season can be provisioned VPN accounts that expire automatically after April 15th. Time-limited accounts reduce administrative overhead and prevent former seasonal workers from retaining access credentials.
  • Mobile Work: Access practice management systems, cloud storage, and tax software securely from any location. Mobile workers benefit from IKEv2/IPsec protocols that automatically reconnect when switching between Wi-Fi and cellular networks.

For practices without on-premises servers, cloud VPN solutions from providers like Perimeter 81 or NordLayer offer centralized management without hardware investments. Cloud-based solutions typically cost $8-15 per user per month and include automatic updates, technical support, and simplified deployment.

Site-to-Site VPN (Network-to-Network)

Site-to-Site VPNs connect entire networks at different physical locations, creating a unified network infrastructure. This architecture suits multi-office firms and organizations requiring permanent connections between geographically distributed locations.

  • Multi-Office Firms: Connect branch offices so employees at any location access shared resources—practice management databases, file servers, centralized backup systems—as if they were on the same local network. Site-to-Site VPNs eliminate the need for individual client software at each location.
  • Partner Collaborations: Securely share client data with co-preparers, audit support firms, or outsourced bookkeeping services without exposing internal networks to the public internet. Partner connections can be configured with restricted access to specific resources rather than full network access.
  • Cloud Service Integration: Create secure tunnels between your office network and cloud infrastructure (AWS, Azure, Google Cloud) where you host tax applications or data warehouses. Cloud integration VPNs ensure data traveling between on-premises and cloud systems maintains encryption end-to-end.

Site-to-Site VPNs require VPN-capable routers or dedicated VPN gateways at each location. Configuration is more complex than Remote Access VPNs but provides seamless network integration. Most practices combine both architectures—Site-to-Site between offices plus Remote Access for individual mobile workers.

⚡ Architecture Decision Factors:

  • Number of Locations: Multiple offices require Site-to-Site VPN for permanent connectivity
  • Mobile Workforce Size: Many remote workers need Remote Access VPN with flexible connection points
  • Centralized Resources: On-premises servers favor Site-to-Site connections for consistent access
  • Cloud-First Operations: Cloud-based practices may only need Remote Access to cloud services
  • IT Expertise: Site-to-Site requires more technical configuration knowledge and ongoing management
  • Budget Constraints: Remote Access typically costs less than Site-to-Site infrastructure

Selecting a Compliant Security Six VPN Provider

Not all commercial VPN services meet IRS Security Six requirements. Tax professionals must evaluate providers based on regulatory compliance features rather than consumer-focused marketing claims about streaming access or privacy. Business-grade VPN services differ fundamentally from consumer products in terms of service guarantees, security features, and compliance documentation.

Critical Evaluation Criteria

1. Business-Grade Service Level Agreements (SLAs)

Consumer VPN services offer no uptime guarantees or liability for service disruptions. Tax professionals require 99.9%+ availability SLAs with financial credits for downtime—especially critical during tax season when filing deadlines approach. Business VPN providers typically guarantee 24/7 priority technical support with sub-1-hour response times, guaranteed bandwidth allocation without throttling during peak usage, dedicated account management for configuration assistance, and contractual data protection commitments meeting GLBA requirements.

2. Verified No-Logs Policy with Third-Party Audit

While IRS regulations require you to maintain access logs for your practice, your VPN provider should not log your browsing activity, connection timestamps, or accessed resources. Verify that providers have completed independent audits by reputable firms. ExpressVPN has been audited by PricewaterhouseCoopers (PwC), NordVPN has been audited by PwC and Deloitte, Surfshark has been audited by Cure53, and Perimeter 81 maintains SOC 2 Type II certification. Third-party audits provide independent verification of security claims rather than relying on provider self-assessment.

3. Dedicated IP Address Availability

Tax professionals benefit from dedicated IP addresses—static IPs assigned exclusively to your account rather than shared among multiple subscribers. IRS Portal Access benefits from dedicated IPs because e-file systems and IRS online accounts sometimes flag shared VPN IPs as suspicious, triggering additional verification steps. Dedicated IPs eliminate these friction points. Firewall Whitelisting allows you to configure your practice firewall to accept connections only from your dedicated IP, blocking all other addresses and preventing unauthorized access attempts.

Email Reputation improves with dedicated IPs because shared IPs risk blacklisting if other subscribers send spam. Dedicated IPs ensure your secure client emails reach destinations without spam filtering. Compliance Documentation simplifies with static IPs by providing consistent access points for WISP documentation and audit trails. Most providers charge $3-7/month additional for dedicated IPs. For practices handling high volumes of e-file submissions or operating self-hosted servers, this investment significantly reduces operational friction.

4. Split Tunneling Configuration

Split tunneling allows you to route specific applications through the VPN while other traffic uses your regular internet connection. Tax-specific use cases include routing tax software and practice management systems through VPN for security while sending VoIP phone systems directly over internet for better call quality, accessing local network printers without routing print jobs through remote VPN servers, and preserving bandwidth for critical tax applications during heavy usage periods.

⚠️ Critical Configuration Rule

Configure split tunneling to ensure that all applications touching NPPI always route through the VPN—never exempt tax-related applications for convenience. Split tunneling that exempts tax software or client portals to improve performance violates IRS Security Six requirements. All applications accessing taxpayer data must route through the encrypted VPN tunnel without exceptions.

Recommended Business VPN Providers for Tax Practices

NordLayer (NordVPN Business): Offers AES-256 encryption, dedicated IPs, and centralized team management. Includes threat protection that blocks malware and phishing sites—reducing attack surface for tax professionals who receive numerous client emails. Pricing scales per user with volume discounts for larger practices, typically $8-12 per user per month for annual commitments.

Perimeter 81: Purpose-built for small and medium businesses, featuring zero-trust network access (ZTNA), conditional access policies based on device posture, and SAML single sign-on integration. Particularly valuable for practices using Microsoft 365 or Google Workspace. Includes dedicated cloud VPN gateways in 40+ locations. Pricing starts at $8 per user per month with additional costs for advanced features.

ExpressVPN Business: Known for reliability and speed, using proprietary Lightway protocol optimized for performance without sacrificing security. Offers 24/7 support and consistently high scores in independent speed tests—critical when uploading large compiled tax return files or downloading complete client financial records. Pricing typically ranges $12-15 per user per month.

Surfshark One Business: Cost-effective solution for budget-conscious practices, offering unlimited simultaneous device connections per license. Includes CleanWeb feature blocking ads and malware. While newer than competitors, provides strong encryption and dedicated IP options at lower price points, typically $6-8 per user per month.

For detailed firewall integration guidance that complements your VPN deployment, see our guide on configuring firewalls for tax practices.

Implementation Steps for Security Six VPN Deployment

Proper VPN implementation requires systematic planning, configuration, testing, and documentation to meet IRS audit requirements. The following five-phase approach ensures comprehensive deployment that satisfies regulatory requirements while minimizing disruption to practice operations.

Phase 1: Planning and Assessment (Week 1)

  1. Inventory Remote Access Needs: Document all scenarios where staff access practice systems remotely—home offices, client sites, business travel, seasonal worker locations. Include frequency of access, types of data accessed, and devices used for remote work.
  2. Identify Protected Resources: List all systems containing NPPI—tax software servers, practice management databases, cloud storage accounts, client portals, email systems. This inventory determines which network segments require VPN protection.
  3. Define User Roles: Create categories of users with different access requirements (partners, staff preparers, administrative support, seasonal temps) to implement least-privilege access controls. Role definitions support zero-trust principles by limiting access to only necessary resources.
  4. Select VPN Architecture: Determine whether Remote Access, Site-to-Site, or hybrid deployment best matches your practice structure. Consider current infrastructure, planned growth, and budget constraints.
  5. Choose Provider: Evaluate 3-5 business VPN providers based on criteria above, request demos, and review service agreements. Verify SLA terms, support availability, and compliance documentation before making final selection.

Phase 2: Configuration and Testing (Week 2-3)

  1. Provision VPN Service: Complete provider signup, configure account settings, and generate user credentials. Document administrative access procedures and emergency contact information.
  2. Deploy VPN Clients: Install VPN software on all devices (laptops, desktops, tablets, smartphones) used for practice work. Test installation on representative devices from each operating system before mass deployment.
  3. Enable Security Features: Activate kill switch, DNS leak protection, and automatic connection on system startup in each client. Verify features function correctly through intentional disconnection tests.
  4. Configure MFA: Integrate multi-factor authentication with VPN access using your chosen solution (app-based TOTP, hardware keys, or push notifications). Test MFA enrollment process with pilot users before full deployment.
  5. Set Up Dedicated IPs: If purchased, configure static IP assignments and document them in your network diagram. Update firewall rules to whitelist dedicated IPs.
  6. Configure Split Tunneling: If needed, define which applications route through VPN and which use direct connections. Ensure all tax-related applications route through VPN without exception.
  7. Test Connectivity: Verify each device can establish VPN connections from various networks (home, mobile hotspot, public Wi-Fi). Test from actual remote work locations where staff will connect.
  8. Verify Encryption: Use online tools to confirm DNS leak protection works and kill switch blocks traffic when VPN disconnects. Document test results for audit purposes.

Phase 3: Firewall Integration (Week 3-4)

  1. Update Firewall Rules: If you manage your own firewall, create rules allowing inbound connections only from VPN IP addresses. This layered approach ensures that even if VPN credentials are compromised, attackers must also bypass firewall restrictions.
  2. Block Direct Access: Disable direct remote desktop protocol (RDP), SSH, or other remote access methods that bypass the VPN. All remote access must route through VPN tunnel.
  3. Configure Port Forwarding: If hosting on-premises servers, set up port forwarding rules that accept connections only through VPN tunnel. Test port configurations to ensure legitimate traffic flows correctly.
  4. Test Access Controls: Attempt to access protected resources from non-VPN connections to verify firewall blocks unauthorized access. Document test procedures and results for compliance records.

✅ VPN Deployment Checklist

  • ☐ VPN client software installed on all devices
  • ☐ Kill switch enabled in all client configurations
  • ☐ DNS leak protection activated and tested
  • ☐ Multi-factor authentication enforced for VPN access
  • ☐ Dedicated IP addresses assigned (if applicable)
  • ☐ Firewall rules updated to whitelist VPN IPs only
  • ☐ Split tunneling configured for non-sensitive applications
  • ☐ Automatic connection on startup enabled
  • ☐ Connection logs reviewed for verification
  • ☐ Staff training completed with documented attendance
  • ☐ WISP updated with VPN policies and procedures
  • ☐ Incident response plan includes VPN compromise scenarios

Phase 4: Training and Documentation (Week 4-5)

  1. Conduct Staff Training: Schedule sessions covering how to connect to VPN before accessing any practice systems, verifying VPN connection status (check for lock icon or indicator), recognizing kill switch activation (no internet until VPN reconnects), completing MFA challenges at login, troubleshooting common issues (slow connections, server switching), and reporting suspicious activity or connection problems.
  2. Update Written Information Security Plan: Document VPN provider name and service tier, encryption protocols and standards used (e.g., “OpenVPN with AES-256”), business justification for remote access, user authorization procedures and access review schedule, technical controls (kill switch, DNS leak protection, MFA), dedicated IP addresses and their authorized uses, and incident response procedures for compromised VPN credentials.
  3. Create Quick Reference Guides: Develop one-page instructions for common tasks (connecting to VPN, troubleshooting connection drops, switching servers) and distribute to all staff. Include screenshots specific to your VPN client software.
  4. Establish Support Procedures: Define who staff contact for VPN issues (internal IT lead or provider support) and document contact information. Create escalation procedures for urgent connectivity problems during tax deadlines.

Phase 5: Ongoing Maintenance and Monitoring

VPN security requires continuous attention beyond initial deployment. Establish regular maintenance schedules to ensure ongoing compliance.

  • Quarterly Access Reviews: Every three months, audit VPN user accounts and remove access for departed employees or contractors whose engagements ended. Document review dates and actions taken.
  • Monthly Connection Audits: Review VPN connection logs to identify unusual patterns—connections from unexpected geographic locations, unusual access times, or excessive failed login attempts. Investigate anomalies promptly.
  • Software Update Verification: Ensure VPN clients automatically update and verify all devices run current versions. Many providers push updates automatically, but confirm no devices fall behind due to user-disabled updates.
  • Annual Penetration Testing: Include VPN security in your annual security assessment. Testers should attempt to bypass VPN controls, exploit misconfigurations, or access internal resources from unauthorized networks. Learn more about penetration testing for tax professionals.
  • Policy Review: Annually review and update VPN policies in your WISP to reflect technology changes, new practice locations, or updated IRS guidance. Document policy review dates and approvals.

Common Security Six VPN Implementation Mistakes

Tax professionals frequently encounter these pitfalls when deploying VPN solutions. Understanding common mistakes helps practices avoid compliance gaps and security vulnerabilities.

Using Consumer VPN Services for Business

Consumer VPN services marketed for streaming access or general privacy lack critical business features—no SLAs, no dedicated IPs, limited or no MFA support, and terms of service that disclaim liability for data breaches. IRS auditors may question whether consumer-grade tools satisfy Security Six requirements. Consumer services typically lack the compliance documentation, audit trails, and security certifications required for regulatory compliance.

Failing to Enable Kill Switch

The kill switch is not always enabled by default in VPN client software. Tax professionals who skip thorough client configuration may believe they’re protected while actually sending data unencrypted whenever VPN connections drop—a common occurrence on unstable home internet or mobile networks. According to CISA guidance, kill switches represent mandatory rather than optional features for organizations handling sensitive information.

Allowing Exceptions for Convenience

Staff may request exceptions—”Can I skip VPN just to check email quickly?”—that undermine security. Every remote access to systems containing NPPI must route through the VPN without exceptions. Configure clients to prevent internet access entirely without active VPN connections. Convenience exceptions create security gaps that attackers exploit.

Neglecting DNS Leak Protection

Even with active VPN connections, misconfigured clients may leak DNS queries to ISPs, revealing which websites you visit. Always test DNS leak protection after initial configuration and periodically verify it remains effective. Use tools like DNSLeakTest.com monthly to ensure DNS queries route exclusively through VPN tunnel.

Poor Credential Management

Sharing VPN credentials among multiple users prevents accountability and access control. Each staff member requires unique VPN credentials tied to their identity. When employees leave, immediately revoke their VPN access—not at the end of the pay period or after final paperwork completes. Immediate revocation prevents former employees from accessing practice systems during transition periods.

Insufficient Documentation

IRS audits require documented evidence of security controls. Deploying a VPN without updating your WISP, maintaining configuration documentation, or recording staff training creates compliance gaps even when technical controls function correctly. Documentation proves compliance during audits and provides operational procedures during incident response.

Integrating VPN with Other Security Six Controls

A security six vpn works most effectively when integrated with the other five mandatory IRS security controls. Layered security approaches provide defense-in-depth protection that prevents single control failures from resulting in data breaches.

Antivirus and Endpoint Protection

VPNs encrypt data in transit but do not scan for malware. Deploy endpoint detection and response (EDR) solutions on all devices that connect via VPN to detect threats that bypass network-level protections. If a remote laptop becomes infected with ransomware, the VPN tunnel could allow malware to spread to your practice network. EDR solutions detect and quarantine infected devices before they spread malware through VPN connections. Review our guide on EDR for tax professionals.

Firewall Configuration

Configure your practice firewall to accept inbound connections exclusively from VPN IP addresses. This layered approach ensures that even if VPN credentials are compromised, attackers must also bypass firewall restrictions. Use application-aware next-generation firewalls that can inspect traffic even within VPN tunnels for suspicious behavior.

Multi-Factor Authentication

Enforce MFA not only for VPN access but also for tax software, email, practice management systems, and cloud storage accessed through the VPN. Layered authentication prevents credential theft from resulting in complete practice compromise. Even if attackers steal VPN credentials, they cannot access protected applications without additional authentication factors.

Data Encryption at Rest

VPNs encrypt data in transit; drive encryption protects data at rest. If a VPN-connected laptop is stolen from a remote worker’s car, full-disk encryption (BitLocker, FileVault) prevents thieves from accessing client data stored locally. Both controls are mandatory components of Security Six and work together to protect data throughout its lifecycle.

Backup Systems

VPN-connected remote workers should not maintain separate backups of client data on personal external drives. Centralize backup operations so that all NPPI—whether accessed from the office or remotely—backs up to secure, encrypted, offsite repositories. VPN access enables remote workers to save files directly to network locations included in centralized backup schedules.

For comprehensive guidance on implementing all Security Six requirements together, explore our complete cybersecurity framework for tax professionals.

VPN Performance Optimization for Tax Software

Tax professionals frequently transfer large files—compiled tax returns, complete client financial records, scanned supporting documents—that can strain VPN connections. Optimize performance without compromising security through strategic configuration and provider selection.

Server Selection Strategy

Choose VPN servers geographically close to your physical location and your cloud service providers. If your tax software runs on AWS servers in US-East (Virginia), select VPN servers in the same region to minimize latency and maximize throughput. Geographic proximity reduces round-trip time for data packets, improving application responsiveness.

Protocol Optimization

WireGuard typically delivers 15-30% better throughput than OpenVPN due to its lean codebase. For practices regularly uploading multi-hundred-megabyte client data files, WireGuard’s performance advantages significantly reduce wait times while maintaining AES-equivalent security. Test different protocols during initial deployment to identify optimal performance for your specific use cases.

Quality of Service (QoS) Configuration

If your practice manages its own router, configure QoS rules to prioritize VPN traffic over non-business uses (streaming, personal browsing). This ensures that tax software connections receive adequate bandwidth even during peak usage. QoS configuration prevents network congestion from degrading business-critical VPN performance.

Bandwidth Monitoring

Establish baseline performance metrics—measure typical upload/download speeds through your VPN during normal operations. Significant degradation may indicate issues with your VPN provider, local internet service, or network congestion requiring troubleshooting. Monitor bandwidth utilization during tax season to identify capacity constraints before they impact productivity.

Load Balancing for Multi-Office Practices

Site-to-Site VPN deployments can implement load balancing across multiple VPN tunnels to different providers or gateway servers. This redundancy ensures that single tunnel failures don’t disrupt entire office connectivity and distributes bandwidth across multiple links. Load balancing requires advanced network configuration but provides significant resilience for larger practices.

Responding to VPN Security Incidents

Your incident response plan must address VPN-specific security events. Preparation enables rapid response that minimizes damage from VPN-related security incidents.

Compromised VPN Credentials

Immediate Actions:

  1. Revoke compromised VPN account immediately through provider management console to prevent further unauthorized access.
  2. Review VPN connection logs to identify unauthorized access attempts or successful connections, documenting timestamps and IP addresses.
  3. Check systems accessed during unauthorized VPN sessions for evidence of data exfiltration, examining file access logs and data transfer records.
  4. Force password resets for all accounts potentially accessed by attacker, including email, tax software, and practice management systems.
  5. Review and strengthen MFA implementation to prevent future credential-based attacks, considering hardware security keys for high-risk accounts.

Follow-Up Actions:

  • Conduct forensic analysis of compromised device to determine how credentials were stolen—keylogger malware, phishing, or other attack vector.
  • Report incident to IRS if taxpayer data was accessed or exfiltrated, following IRS Publication 4557 breach notification procedures.
  • Notify affected clients per state data breach notification laws, which vary by jurisdiction regarding timing and notification methods.
  • Document incident details, response actions, and remediation in your incident log for audit purposes and future reference.
  • Update WISP with lessons learned and enhanced controls to prevent similar incidents in the future.

VPN Provider Breach

If your VPN provider suffers a data breach, assess impact based on provider’s no-logs policy. Audited no-logs providers should have minimal exposure since they don’t retain connection data. Take precautionary measures including forcing password resets for all VPN accounts, re-evaluating provider security and considering migration if breach reveals systemic weaknesses, reviewing connection logs for unusual activity during breach window, and documenting provider breach in your incident log to assess whether client notification is required.

VPN Software Vulnerability

Critical vulnerabilities in VPN client software or protocols require immediate patching. Subscribe to security advisories from your VPN provider and protocol developers (OpenVPN, WireGuard). Deploy emergency patches within 24-48 hours of critical vulnerability disclosure. If patches aren’t available, consider temporarily disabling VPN access and requiring on-site work until fixes deploy. Test patches in non-production environment before rolling out to all devices, and verify all devices successfully update—quarantine any that fail to patch.

Frequently Asked Questions About Security Six VPN

Do I need a VPN if I only work from home on a secure network?

Yes. IRS Security Six requires VPN protection for all remote access to systems containing NPPI, regardless of whether your home network is “secure.” Home routers typically lack enterprise-grade security controls, and ISPs can monitor unencrypted traffic passing through their infrastructure. Additionally, IRS auditors expect documented remote access controls—VPN implementation demonstrates compliance even for home-only remote work scenarios. The requirement applies universally to all remote access situations, not just public Wi-Fi or untrusted networks.

Can I use a free VPN service for my tax practice?

No. Free VPN services generate revenue through advertising, selling user data, or offering inadequate security that funnels users toward paid tiers. They lack SLAs, business support, MFA integration, and compliance documentation required for IRS Security Six. Many free VPNs have been caught logging user activity despite privacy claims. Tax professionals must use business-grade paid VPN services with verified no-logs policies and appropriate security certifications. Free services expose practices to significant compliance and security risks.

How do I verify my VPN connection is actually secure?

Perform these verification tests regularly: DNS Leak Test by visiting DNSLeakTest.com while connected to VPN (results should show only your VPN provider’s DNS servers—never your ISP); IP Address Check by visiting WhatIsMyIPAddress.com to confirm your public IP shows the VPN server location, not your actual physical location; Kill Switch Test by disconnecting VPN service while connected with kill switch enabled (your internet access should be completely blocked until VPN reconnects); and WebRTC Leak Test using BrowserLeaks.com/webrtc to verify WebRTC doesn’t reveal your real IP address while VPN is active. Conduct these tests monthly to ensure configurations remain secure.

What happens if my VPN connection drops while uploading a tax return?

If your kill switch is properly configured, all internet traffic stops immediately when the VPN disconnects—your upload will fail but no data transmits unencrypted. Properly configured tax software should allow you to reconnect VPN and resume the upload. This temporary inconvenience is the kill switch functioning correctly to protect NPPI. If data continues transmitting after VPN disconnects, your kill switch is not working—immediately reconfigure and test. Some VPN clients offer split-second reconnection that minimizes upload interruption while maintaining security.

Do all employees need separate VPN accounts?

Yes. Each staff member requires unique VPN credentials for accountability and access control. Shared credentials prevent you from identifying who accessed what resources and when—critical information for security audits and incident investigations. Most business VPN providers license per user, and you should provision accounts matching your staff count including seasonal workers. Unique credentials enable immediate access revocation when employees leave and provide detailed audit trails for compliance documentation.

Can I access IRS e-file portals through a VPN?

Yes, and doing so satisfies IRS remote access security requirements. However, some e-file systems may initially flag VPN IP addresses as unusual and require additional verification. This is why dedicated IP addresses benefit tax professionals—IRS systems recognize your consistent IP address and don’t trigger repeated security challenges. If using shared VPN IPs, you may need to complete additional identity verification steps on first access, but subsequent connections should proceed normally once the IP is recognized.

How much does a compliant business VPN cost for a small tax practice?

Business VPN pricing typically ranges from $8-15 per user per month for standard encryption and business support, with dedicated IP add-ons costing an additional $3-7 per IP per month. Advanced features including zero-trust access, SSO integration, and threat protection range from $15-25 per user per month. Site-to-Site VPN implementations cost $50-200+ per month depending on bandwidth and number of sites. A typical 5-person practice with Remote Access VPN and one dedicated IP might pay $400-900 annually—a minor investment compared to potential breach costs averaging $4.88 million or IRS penalties up to $10,000 per incident.

What should I document about my VPN in my Written Information Security Plan?

Your WISP must document VPN provider name, service tier, and contract dates; encryption protocols and key lengths used (“OpenVPN with AES-256-GCM”); business justification for remote access (“Enable secure remote work and multi-office connectivity”); user authorization procedures (“Practice administrator approves VPN access requests”); access review schedule (“Quarterly review of active VPN accounts”); technical security controls (“Kill switch, DNS leak protection, MFA required”); dedicated IP addresses and their uses (“Static IP 203.0.113.45 for firewall whitelisting”); staff training requirements and completion records; and incident response procedures for VPN-related security events.

Secure Your Practice with Compliant VPN Implementation

Bellator Cyber specializes in Security Six compliance for tax and accounting professionals. Our team will assess your remote access requirements, recommend compliant VPN solutions, and manage deployment from initial configuration through staff training and WISP documentation.

Schedule Your Security Assessment →

Essential Resources for Security Six VPN Implementation

Tax professionals should reference these authoritative sources when implementing security six vpn solutions:

Government Publications

Industry Standards

Testing Tools

By implementing a robust security six vpn solution that meets IRS encryption standards, integrates with multi-factor authentication, and includes kill switch protection, tax professionals satisfy federal compliance requirements while enabling secure, flexible remote work. Combined with the other five Security Six controls—antivirus, firewalls, two-factor authentication, backups, and drive encryption—your practice builds defense-in-depth protection that safeguards client data, prevents costly breaches, and maintains the trust essential to professional tax preparation services.

FREE WISP TEMPLATE

Free WISP Template (Blog)

Share This

Ready to Transform Your Cybersecurity?

Opt for Bellator and invest in top-tier protection and peace of mind. Our solutions deliver unmatched safety through innovative design, tailored specifically for your needs.

Related Articles

0
    Your Cart
    Your cart is emptyReturn to Shop