
What IRS Publication 4557 Actually Requires
If you prepare federal tax returns, IRS Publication 4557 — Safeguarding Taxpayer Data — is not optional reading. It establishes the baseline security requirements every tax professional must meet to legally handle taxpayer information. Failure to comply exposes you to IRS sanctions, state regulatory action, and civil liability if a breach occurs.
Publication 4557 draws its authority from the Gramm-Leach-Bliley Act (GLBA), which classifies tax preparers as financial institutions subject to the Federal Trade Commission (FTC) Safeguards Rule, 16 C.F.R. Part 314. The 2023 amendments to the FTC Safeguards Rule significantly expanded technical requirements, and the IRS incorporated those updates into its guidance. If your firm has not revisited its security program since 2022, you are likely out of compliance today.
At its core, tax safeguard compliance under Publication 4557 requires you to implement a written information security program scaled to your firm's size, complexity, and the sensitivity of the data you hold. That program must address access controls, encryption, multi-factor authentication, vendor oversight, and incident response — not as aspirational goals, but as documented, operational controls.
This guide explains each requirement, who it applies to, and how to build a compliance program that withstands IRS scrutiny. For a broader look at security obligations in your practice, see our guide to cybersecurity for tax professionals.
The Threat Environment Tax Professionals Face
IBM Cost of a Data Breach Report 2024
Verizon 2024 Data Breach Investigations Report
IRS Identity Theft Tax Refund Fraud estimates
Who Must Comply with Publication 4557
Any individual or firm that prepares — or assists in preparing — federal tax returns for compensation falls under Publication 4557. This includes:
- Enrolled Agents (EAs)
- Certified Public Accountants (CPAs) and CPA firms
- Tax attorneys who prepare returns
- Non-credentialed preparers with a valid Preparer Tax Identification Number (PTIN)
- Volunteer Income Tax Assistance (VITA) and Tax Counseling for the Elderly (TCE) sites handling return data
The IRS has been explicit: there is no minimum return volume threshold for the basic safeguarding obligations. Even a solo preparer filing 10 returns per year must maintain a Written Information Security Plan (WISP) and implement the technical controls described in Publication 4557. The FTC Safeguards Rule applies directly to any tax preparer acting as a financial institution under GLBA, which the FTC confirmed covers tax preparation services.
Firms with 5,000 or more customer records trigger additional FTC requirements, including appointing a qualified individual to oversee the information security program and conducting annual penetration testing. Most multi-preparer firms will cross this threshold when you count all years of retained client records.
State-level obligations layer on top of federal requirements. Massachusetts 201 CMR 17.00, New York 23 NYCRR 500, and California's CCPA each impose independent duties. Publication 4557 compliance establishes a federal floor — it does not preempt stricter state rules.
IRS Enforcement Is Accelerating
The IRS Office of Professional Responsibility (OPR) can suspend or disbar tax professionals who fail to safeguard client data under Circular 230, §10.23. A breach resulting from documented negligence — such as no WISP, no MFA, or unpatched systems — is treated as a violation of professional standards, not merely a technical lapse. Document your controls now, before an incident forces the conversation.
The Six Core Requirements of Tax Safeguard Compliance
Publication 4557 organizes its requirements around six security domains. Each maps directly to controls found in NIST SP 800-171 and the FTC Safeguards Rule. Understanding how these frameworks interconnect is essential for building a defensible compliance program.
1. Written Information Security Plan (WISP)
Every tax professional must maintain a WISP that is written, current, and tailored to their practice. The IRS published a sample WISP template in IRS Publication 5708 to provide a starting point. However, a copy-paste WISP that does not reflect your actual systems, vendors, and workflows provides no real protection and will not satisfy an OPR inquiry. See our detailed breakdown of the IRS Publication 5708 sample WISP for implementation guidance.
Your WISP must identify the person responsible for coordinating the program, describe the data you collect and how you store it, define your risk assessment process, and document how you will respond to a security incident.
2. Risk Assessment
You must conduct a documented risk assessment that identifies foreseeable threats to taxpayer data — both internal and external. This is not a one-time exercise. The FTC Safeguards Rule requires reassessment whenever you experience a material change in operations, such as adopting new software, changing cloud providers, or expanding staff. Risk assessments should feed directly into control selection and remediation planning.
3. Access Controls and Multi-Factor Authentication (MFA)
The 2023 FTC Safeguards Rule amendments made Multi-Factor Authentication (MFA) mandatory for any system containing customer financial information. For tax professionals, this means MFA on your tax preparation software, email accounts, cloud storage, and any remote access solution. Single-factor password authentication no longer satisfies federal requirements regardless of password complexity.
Access controls must follow the principle of least privilege: staff should only access the client records necessary for their specific job functions. Shared logins and generic service accounts are explicitly prohibited under a defensible compliance program.
4. Encryption
Taxpayer data must be encrypted at rest and in transit. Publication 4557 references encryption of data stored on laptops, removable media, and cloud services, as well as encrypted transmission when sending tax documents electronically. Unencrypted email is not an acceptable method for transmitting Social Security numbers, tax forms, or financial records. Use a secure client portal or encrypted file-sharing service instead.
5. Vendor and Third-Party Management
Tax professionals frequently rely on cloud-based tax software, payroll providers, bookkeeping platforms, and IT support vendors. Each of these third parties can become an entry point for attackers. Publication 4557 requires you to evaluate the security practices of service providers who access, store, or transmit taxpayer data on your behalf, and to contractually require them to implement appropriate safeguards. A vendor questionnaire and written agreement are the minimum documentation you should maintain.
6. Incident Response and Breach Notification
You must have a documented incident response plan template that defines how your firm will detect, contain, and recover from a security incident. Beyond internal response, the IRS requires tax professionals to report data theft to the IRS Stakeholder Liaison within 24 to 48 hours of discovery. Most states impose additional breach notification timelines — typically 30 to 72 hours — for incidents affecting residents. Your plan must account for both federal and state notification obligations.
Building Your Tax Safeguard Compliance Program
Inventory Your Data and Systems
Document every location where taxpayer data is stored or processed: local workstations, external drives, cloud tax software, email systems, and backup solutions. You cannot protect data you have not mapped.
Conduct a Formal Risk Assessment
Identify threats (phishing, ransomware, insider misuse), evaluate existing controls, and document gaps. Use the NIST SP 800-171 control catalog as a reference framework for completeness.
Draft or Update Your WISP
Use the IRS Publication 5708 template as a foundation, then customize it to reflect your actual vendor list, staff roles, and technical environment. Assign a designated WISP coordinator by name.
Implement Technical Controls
Enable MFA on all systems, encrypt data at rest and in transit, deploy endpoint protection, configure automatic patching, and disable unused remote access ports. Document each control as implemented.
Train Your Staff
Conduct annual security awareness training covering phishing recognition, password hygiene, and incident reporting procedures. Document training completion for each staff member.
Test and Monitor
Schedule annual vulnerability assessments and, for larger firms, penetration testing. Review access logs, monitor for unusual login activity, and audit vendor access quarterly.
Review and Update Annually
Revisit your WISP and risk assessment each tax season. Update documentation when you add new software, change vendors, hire staff, or experience any security incident — however minor.
Technical Controls: What Implementation Actually Looks Like
Publication 4557 describes what controls you need; it leaves the how largely to you. Here is what defensible implementation looks like in a working tax practice.
Endpoint Security
Every workstation and laptop that touches taxpayer data needs more than a basic antivirus product. Modern threats — particularly ransomware variants targeting professional services firms — evade signature-based detection routinely. Endpoint Detection and Response (EDR) tools provide behavioral monitoring that catches attacks antivirus misses. For guidance on selecting the right product, see our review of antivirus for tax professionals.
Cloud Storage and Tax Software
Many tax professionals have moved to cloud-based platforms for convenience. The IRS accepts cloud storage when it meets appropriate security standards — but not all cloud providers are equivalent. Before storing client data with any provider, verify their SOC 2 Type II certification, confirm data is encrypted with keys you control or that the provider manages under documented key management practices, and ensure the service agreement includes a data processing agreement with breach notification terms. Our analysis of whether cloud storage is IRS compliant walks through the evaluation criteria.
Remote Access
Working from home or across multiple office locations introduces significant risk if remote access is not properly secured. Virtual Private Networks (VPNs) must use strong authentication — MFA plus certificate-based controls where possible. Remote Desktop Protocol (RDP) exposed directly to the internet is one of the most exploited attack vectors in ransomware campaigns targeting small professional firms. If you use RDP, place it behind a VPN gateway and restrict access to specific IP ranges. For a deeper look at access control architecture, our guide to what is zero trust security explains the model the FTC Safeguards Rule increasingly reflects.
Secure Client Communication
Emailing W-2s, Social Security numbers, or prior-year returns is a compliance violation under Publication 4557 and a negligence risk if that email is intercepted. Use a dedicated secure client portal — most professional tax platforms (Drake, UltraTax, Lacerte) include one. If your platform does not, standalone secure document delivery services provide encrypted file exchange with client authentication. For cloud-based alternatives, review the best cloud services for tax professionals.
Common Compliance Gaps Found in Tax Practices
After working with tax professionals across firm sizes, the same gaps appear repeatedly. Knowing where programs typically break down helps you prioritize remediation.
WISP exists but is not current. Firms download a template, sign it, and file it away. When audited or breached, the WISP describes software and vendors that no longer exist and omits systems that were added years ago. Your WISP is only as useful as its accuracy.
MFA is enabled on one system but not all. A firm enables MFA on its tax software but leaves email and cloud storage on single-factor authentication. Attackers target the weakest authentication point, not the strongest. MFA must be consistent across every system accessing taxpayer data.
No formal vendor review. Many preparers use five to ten cloud services — scheduling tools, document storage, payroll processors, bookkeeping software — without ever reviewing the security practices of those vendors. Each one is a potential breach vector that reflects back on your compliance program.
Incident response is theoretical. Firms have a plan written down but have never walked through it. When a phishing attack succeeds or ransomware deploys, staff do not know who to call, which systems to isolate, or when to notify the IRS. Tabletop exercises — even a 60-minute annual walkthrough of a hypothetical scenario — dramatically improve actual response effectiveness.
Data retention without data destruction. Publication 4557 addresses not just protecting data you hold, but ensuring data you no longer need is securely destroyed. Tax records kept beyond their required retention period increase your liability without adding compliance value. Define a data retention schedule and implement secure destruction procedures for media and paper records alike.
How Bellator Cyber Guard Supports Tax Safeguard Compliance
WISP Development & Review
We build or audit your Written Information Security Plan against IRS Publication 4557 and FTC Safeguards Rule requirements, producing a document that reflects your actual environment.
Endpoint Detection & Response
EDR deployment and management across all workstations and servers, with 24/7 monitoring and automated threat containment — replacing reactive antivirus with proactive defense.
MFA Implementation
Full multi-factor authentication rollout across tax software, email, cloud storage, and remote access systems, with staff onboarding and helpdesk support.
Dark Web Monitoring
Continuous scanning for compromised staff credentials and client data appearing in underground marketplaces, with real-time alerts and response guidance.
Vulnerability Assessments
Annual technical assessments identifying exploitable weaknesses in your network, software, and configuration — with prioritized remediation guidance.
Security Awareness Training
Phishing simulation and training programs tailored to tax firm workflows, with completion tracking and documentation for your compliance records.
Get a Free Tax Safeguard Compliance Assessment
Find out exactly where your firm stands against IRS Publication 4557 requirements. Our team will review your current controls, identify gaps, and give you a clear remediation roadmap — no obligation.
Frequently Asked Questions
IRS Publication 4557, Safeguarding Taxpayer Data, is the IRS's primary guidance document outlining the data security obligations of tax professionals. It incorporates requirements from the Gramm-Leach-Bliley Act (GLBA) and the FTC Safeguards Rule, and covers written security plans, access controls, encryption, vendor management, and incident response. All tax preparers who handle federal returns for compensation must comply, regardless of firm size.
Yes. The IRS requires every tax professional who prepares returns for compensation to maintain a Written Information Security Plan (WISP), including solo preparers with a single-person practice. There is no minimum return volume that triggers or exempts this requirement. The IRS published a sample template in Publication 5708 to help small practices meet this obligation with proportionate controls.
Non-compliance carries several risk layers. The IRS Office of Professional Responsibility (OPR) can issue sanctions including censure, suspension, or disbarment from practice before the IRS under Circular 230. The FTC can impose civil penalties for violations of the Safeguards Rule. State attorneys general can pursue separate enforcement actions. And if a breach occurs, documented failure to implement required controls significantly increases civil liability to affected clients.
Yes. The FTC classifies tax preparers as financial institutions under the Gramm-Leach-Bliley Act because they provide tax preparation as a financial service. The FTC Safeguards Rule (16 C.F.R. Part 314) applies directly, and the 2023 amendments — which added mandatory MFA, encryption requirements, and enhanced vendor oversight — apply to tax preparation firms. The IRS incorporated these requirements into its Publication 4557 guidance.
At minimum, your WISP should be reviewed and updated annually — most practitioners tie this to the start of each tax season. Beyond the annual review, you must update it whenever you experience a material change: adopting new software, changing cloud providers, adding staff with data access, moving offices, or experiencing any security incident. The FTC Safeguards Rule explicitly requires reassessment after material operational changes.
Multi-Factor Authentication (MFA) must be enabled on every system that accesses, stores, or transmits taxpayer data. This includes your tax preparation software, email account, cloud storage (Google Drive, Dropbox, OneDrive), remote access tools (VPN, Remote Desktop), and any client portal. Using MFA on some systems but not others does not satisfy the FTC Safeguards Rule requirement — coverage must be consistent across all applicable systems.
The IRS expects notification within 24 to 48 hours of discovering that taxpayer data has been compromised. You report to your local IRS Stakeholder Liaison, who coordinates with the IRS Incident Management team. In parallel, most states impose separate breach notification requirements ranging from 30 to 72 hours, and you may need to notify affected clients directly. Your incident response plan should have the IRS Stakeholder Liaison contact number and your state notification timeline documented and ready before an incident occurs.
No. Transmitting Social Security numbers, W-2s, tax returns, or other sensitive financial documents via unencrypted personal email violates Publication 4557 and the FTC Safeguards Rule. Tax professionals must use a secure client portal or encrypted file delivery service for all document exchange containing taxpayer data. Most professional tax platforms include a secure portal; if yours does not, a standalone encrypted file-sharing service satisfies the requirement.
These are distinct IRS documents. IRS Publication 4557 is a guidance document — it describes data security requirements for tax professionals and does not require submission to the IRS. IRS Form 4557 (Safeguarding Taxpayer Personal Data) is an acknowledgment form used in certain IRS agreements. When tax professionals refer to '4557 compliance,' they are typically referring to the obligations described in Publication 4557, not a filing requirement associated with Form 4557.
No. Professional tax software (Drake, ProSeries, UltraTax, Lacerte, etc.) provides security features — encryption, audit logs, access controls — but using the software does not make your firm compliant. You are responsible for how you configure it, who has access, whether MFA is enabled, and whether you have documented your security program in a WISP. The software is a tool; compliance requires documented policies, trained staff, and ongoing oversight that go well beyond the software itself.
Schedule
Need help with IRS compliance?
Our tax cybersecurity specialists can review your security posture and help you get compliant.



