Skip to content

Free 15-minute cybersecurity consultation — no obligation

Book Free Call
Tax20 min read

Ultimate WISP Requirements Guide 2025: Essential Compliance Steps for Tax Professionals

Meet 2026 IRS and FTC WISP requirements: all 9 mandated security elements, implementation steps, and compliance deadlines for tax professionals.

Ultimate WISP Requirements Guide 2025: Essential Compliance Steps for Tax Professionals - wisp requirements 2025

What WISP Requirements Actually Mandate for Tax Professionals

Every tax preparer, CPA, enrolled agent, and accounting firm operating in the United States must maintain a Written Information Security Plan (WISP)—a documented cybersecurity program that satisfies both Federal Trade Commission and IRS mandates. This is a federal legal requirement, enforced through substantial financial penalties and, in cases of false attestation, criminal liability.

The legal foundation runs through two parallel regulatory tracks. The Gramm-Leach-Bliley Act (GLBA), enacted in 1999, classified tax professionals as financial institutions subject to the same data protection obligations as banks and investment firms. GLBA Section 501(b) requires these institutions to establish administrative, technical, and physical safeguards to protect customer information. The FTC translates this statutory obligation into enforceable rules through the Standards for Safeguarding Customer Information (16 CFR Part 314)—commonly called the FTC Safeguards Rule. The 2021 amendments strengthened enforcement significantly by mandating specific technical controls—including multi-factor authentication (MFA) and encryption—that were previously recommended but not required.

The IRS reinforces these mandates through IRS Publication 4557 and the Security Summit initiative, a public-private partnership launched in 2015. The August 2024 update to IRS Publication 5708 introduced material changes—universal MFA for all system access, updated password standards aligned with NIST SP 800-63B, and clarified breach notification timelines—that apply to the 2026 filing season. According to the IBM Cost of Data Breach Report 2024, the average breach costs $4.88 million per incident, a figure that underscores why regulators treat security program failures as violations warranting serious financial penalties.

The enforcement mechanism with the sharpest teeth is PTIN renewal. Tax professionals must certify compliance with security requirements when renewing their Preparer Tax Identification Numbers. A false certification is not a paperwork error—it constitutes federal fraud subject to criminal prosecution under 18 U.S.C. § 1001. For a full breakdown of what this attestation requires, see our guide to PTIN and WISP requirements for tax preparers.

WISP Compliance By The Numbers

$4.88M
Avg. Data Breach Cost

IBM Cost of Data Breach Report 2024

$50,000+
Min. FTC Penalty Per Violation

FTC Safeguards Rule enforcement actions

277 Days
Avg. Breach Detection Time

IBM Security / Ponemon Institute 2024

Who Must Comply: Clearing Up the 5,000-Consumer Myth

A dangerous misconception circulates among small tax practices: that firms serving fewer than 5,000 clients are fully exempt from WISP requirements. This misreading of FTC regulations exposes thousands of solo practitioners and small practices to significant compliance violations and security gaps.

The FTC Safeguards Rule does reference a 5,000-consumer threshold, but the exemption is narrow. It reduces documentation requirements for specific subsections—it does not eliminate the obligation to maintain an information security program. Every tax professional handling customer information, including solo practitioners preparing returns for a single client, must document and implement security programs covering all fundamental safeguard categories.

Firms with fewer than 5,000 consumers may have reduced requirements for written risk assessment documentation and incident response testing records, but they must still conduct these activities and implement the controls they identify. The exemption lightens paperwork on certain subsections; it does not remove the underlying security obligations.

The IRS applies an equally expansive interpretation. WISP requirements attach to access to taxpayer data—not client volume. Any entity that accesses, stores, processes, or transmits nonpublic personal information—Social Security numbers, income data, financial account details—falls under the mandate. For a step-by-step approach to building your plan, see our guide on how to create a WISP.

2026 Filing Season Compliance Deadline

The IRS requires all tax preparers to have an updated WISP reflecting the August 2024 Publication 5708 changes before the start of the 2026 filing season. Key changes include universal MFA across all systems—including in-office workstations, not just remote access—and updated password management standards. Firms without compliant plans face potential PTIN suspension and FTC enforcement referrals.

Bottom Line

No tax preparer is exempt from WISP requirements. The 5,000-consumer threshold only reduces documentation requirements for specific subsections—it does not eliminate the obligation to implement and maintain an information security program. Solo practitioners and small CPA firms must comply with all nine core WISP elements.

The Nine Mandatory WISP Elements

The FTC Safeguards Rule section 314.4 enumerates nine required components of a compliant information security program. Every covered entity must address all nine with policies, procedures, and technical controls proportionate to their size and risk profile. Weakness in any single element undermines the entire program—regulators evaluate all nine during audits, not a subset.

1. Designated Qualified Individual

Every covered entity must designate a qualified individual to oversee, implement, and enforce the information security program. This person coordinates all security activities, manages vendor relationships, oversees incident response, and reports to practice leadership. For solo practitioners, you serve as your own qualified individual—formal documentation of your responsibilities is essential for compliance verification. If internal expertise is insufficient, partnering with a cybersecurity specialist for tax and accounting firms satisfies this element while ensuring qualified oversight.

2. Risk Assessment

Risk assessments form the analytical foundation of your WISP. They identify threats to customer information and evaluate whether existing safeguards adequately address those threats. Assessments must examine both internal threats—employee errors, inadequate training, system misconfigurations, insider access abuse—and external threats including phishing campaigns, malware infections, physical theft, and social engineering attacks. Document your methodology, specific findings, likelihood and impact analysis, and prioritization criteria. Build a risk register listing each identified threat, current mitigation measures, and residual risk levels. Update assessments at minimum annually or whenever significant changes occur to your technology environment or business operations.

3. Safeguard Design and Implementation

Based on risk assessment findings, design and implement administrative, technical, and physical safeguards proportionate to identified risks. Technical safeguards include firewalls, intrusion detection systems, encryption protocols, access controls, and security monitoring tools. Administrative safeguards cover policies, procedures, and employee training programs. Physical safeguards address facility security, device management, and secure disposal. Verify safeguard effectiveness through vulnerability scanning, security audits, and continuous monitoring—then document all testing results and remediation actions to build an audit trail demonstrating ongoing program commitment.

4. Service Provider Oversight

Tax practices must select service providers capable of maintaining appropriate safeguards for customer information and require those safeguards through written contracts. This applies to tax software vendors, cloud storage providers, IT support firms, payroll processors, and any entity accessing customer information on your behalf. Written agreements must specifically address security obligations, data handling requirements, breach notification procedures, and audit rights. Conduct due diligence before engaging providers by reviewing their SOC 2 Type II reports and ISO 27001:2022 certifications. Annual vendor reassessments are now considered regulatory best practice—not optional follow-up.

Multi-Factor Authentication Implementation Checklist

  • Inventory all systems and applications that access or store customer information
  • Select an MFA solution compatible with your tax software and IT infrastructure
  • Deploy MFA on tax preparation software and all workstations, including in-office access
  • Enable MFA on all email accounts used for client communication
  • Require MFA on cloud storage, file-sharing platforms, and backup systems
  • Implement MFA for all remote access connections — VPN, remote desktop, and cloud applications
  • Train all staff on MFA enrollment and daily authentication procedures
  • Document MFA implementation in your WISP, specifying each solution deployed
  • Establish backup authentication methods for lost or unavailable devices
  • Test MFA functionality across all systems before the filing season begins

5. Program Evaluation and Adjustment

Information security programs require regular evaluation based on monitoring results, testing outcomes, operational changes, and regulatory updates. Conduct annual reviews examining all nine WISP elements for continued relevance and effectiveness. Trigger additional evaluations after implementing new technology, expanding services, experiencing a security incident, or when the IRS or FTC issues updated guidance. Document all evaluation activities, findings, decisions, and program modifications—this record demonstrates continuous improvement rather than a one-time compliance effort.

6. Multi-Factor Authentication

The 2021 Safeguards Rule amendments established universal MFA requirements for any individual accessing customer information systems, including in-office staff on the internal network. Acceptable implementations combine at least two authentication factors from different categories: something you know (password or PIN), something you have (authenticator app, hardware security key, or smart card), or something you are (fingerprint or facial recognition). Authenticator apps such as Microsoft Authenticator and Google Authenticator are widely accepted. Hardware security keys such as YubiKey provide the strongest assurance level. SMS-based codes remain acceptable under current rules but offer lower security than app-based methods and should be treated as a fallback, not a primary method.

7. Encryption

Encrypt customer information both in transit over external networks and at rest on all storage systems. Transit encryption protects email transmissions, cloud synchronization, remote access sessions, and file transfers—use TLS 1.2 or higher for web traffic and SFTP or FTPS for file transfers. At-rest encryption protects data on servers, workstations, laptops, mobile devices, backup media, and cloud storage. Implement full-disk encryption on all devices containing customer data using BitLocker (Windows), FileVault (macOS), or enterprise encryption management platforms. For cloud storage, verify that providers encrypt data both in transit and at rest; consider client-side encryption for particularly sensitive information before upload.

8. Secure Disposal

Implement documented procedures for secure disposal of customer information when retention is no longer legally required. Electronic data requires secure deletion tools that overwrite storage multiple times, degaussing for magnetic media, or physical destruction of storage devices. Paper records require cross-cut shredding or professional document destruction services with certificates of destruction. Maintain disposal records documenting dates, methods, and responsible individuals for all disposal activities—covering paper files, electronic documents, backup tapes, decommissioned hardware, and temporary files.

9. Incident Response Plan

Maintain a written incident response plan addressing detection, containment, response, recovery, and notification. The plan must define what constitutes a security incident, establish clear roles and responsibilities, outline step-by-step response procedures, specify notification requirements for affected clients and regulators, and include forensic evidence preservation procedures. The IRS expects notification when taxpayer data is compromised—typically within 72 hours of breach discovery for federal requirements. Test the plan at minimum annually through tabletop exercises and update it based on lessons learned. A tested, documented response plan is a regulatory expectation; an untested plan is a liability.

Six-Phase WISP Implementation Roadmap

1

Assess Your Current Security Posture (Weeks 1–2)

Audit existing policies, procedures, and technical controls against all nine mandatory WISP elements. Identify specific gaps—missing MFA, inadequate encryption, absent incident response procedures, undocumented risk assessments. Designate your qualified individual and identify any external cybersecurity partners needed to fill expertise gaps.

2

Conduct Risk Assessment and Draft Core Document (Weeks 3–4)

Document all identified threats across systems, applications, networks, and physical locations handling customer data. Build a risk register with likelihood and impact ratings. Begin drafting your WISP with each of the nine required elements customized to your actual operations—not generic template language copied from an unmodified sample.

3

Deploy Technical Controls (Weeks 5–8)

Implement MFA across all systems accessing customer data, full-disk encryption on all devices, email encryption for client communications, firewall configuration and network segmentation, endpoint protection with centralized management, and encrypted offsite backup. Verify and document each control after deployment.

4

Review and Update Vendor Contracts (Weeks 9–10)

Request SOC 2 Type II reports, security certifications, and compliance attestations from all service providers. Update or replace contracts to include specific security obligations, data handling requirements, breach notification procedures, and audit rights. Begin transition planning for vendors that cannot meet regulatory requirements.

5

Train Staff and Test Controls (Weeks 11–12)

Deliver security awareness training covering phishing recognition, MFA usage, password management, physical security protocols, and incident reporting. Document training completion for all personnel. Conduct tabletop incident response exercises and verify technical controls through testing—document all results and remediation actions.

6

Establish Ongoing Compliance Cadence (Continuous)

Schedule annual WISP reviews and updates, quarterly security training refreshers, monthly vulnerability scans, annual incident response plan testing, and annual vendor security reassessments. Implement continuous monitoring where feasible to detect security events in real time rather than through periodic checks.

2026 Regulatory Updates Every Tax Preparer Must Know

The August 2024 update to IRS Publication 5708 introduced the most significant changes to WISP requirements since the FTC's 2021 Safeguards Rule amendments. Three changes carry particular weight for practices entering the 2026 filing season.

Universal MFA eliminates the in-office exception. Previous guidance created ambiguity about whether MFA was required for local network access or only remote connections. The updated Publication 5708 resolves that ambiguity: MFA is required for all users accessing systems containing customer information, regardless of whether access originates inside or outside the office network. In-office staff accessing tax software, file servers, or cloud applications from within the building must use MFA. Every workstation, server connection, and application in your practice now requires multi-factor verification.

Password standards align with NIST guidance. Password management requirements shifted from mandatory 90-day change cycles to minimum 365-day intervals, reflecting NIST SP 800-63B guidance that frequent forced changes often produce weaker passwords and unsafe management practices such as writing them down. Passwords must still be changed immediately when compromise is suspected, when individuals with password knowledge leave the organization, or when unauthorized access is detected. Minimum length requirements are now 12 characters with complexity requirements including uppercase, lowercase, numbers, and special characters.

Breach notification timelines are now explicit. Updated guidance clarifies that tax professionals must notify the IRS, affected clients, and potentially state regulators and law enforcement when data breaches occur. The federal expectation is notification without unreasonable delay—typically within 72 hours of breach discovery. Failure to notify affected parties can result in additional penalties beyond those for the underlying security failure. Build notification procedures, contact lists, and communication templates before incidents occur; drafting them during a breach response adds hours to detection time and multiplies legal exposure.

Common WISP Implementation Mistakes to Avoid

Regulatory audits in 2026 focus increasingly on five specific deficiencies. Each represents a gap between documented security posture and actual practice—the exact disconnect regulators examine first.

Treating the WISP as a one-time document. Filing a WISP and never revisiting it is the most widespread failure. Plans must be reviewed annually and updated whenever technology, operations, regulatory requirements, or the threat environment changes. A WISP describing systems you no longer use fails on its face.

Using generic templates without customization. Template language that does not reflect your specific software applications, network architecture, vendor relationships, and physical locations fails to satisfy the regulatory requirement. Every section must describe your actual controls and procedures.

Skipping ongoing employee training. Annual training is the regulatory minimum; quarterly reinforcement better addresses how quickly attack techniques evolve. Simulated phishing campaigns test recognition in realistic conditions. Our resources on security awareness training for tax firms address the specific social engineering tactics most commonly used against tax professionals.

Failing to document security activities. During a regulatory audit or legal proceeding following a breach, undocumented activities are treated as if they never occurred. Document risk assessments, testing results, training completions, vendor evaluations, incident investigations, and program reviews without exception.

Neglecting physical security. Many practices implement thorough technical controls while overlooking physical threats. Laptop theft, unauthorized office access, and improper disposal of paper records remain significant risk vectors. Physical safeguards—locked storage for sensitive documents, screen privacy filters, visitor access controls, and secure paper destruction—must be documented alongside technical controls in your WISP.

Building a Durable, Audit-Ready Security Program

A compliant WISP is not the same thing as a secure practice—but the two are closely related. The nine mandatory elements exist because they collectively address the most common and damaging threat vectors targeting tax professionals: phishing attacks that harvest credentials, ransomware that encrypts client data, insider errors that expose sensitive records, and vendor breaches that compromise downstream clients.

Firms that treat compliance as a floor rather than a ceiling consistently achieve better security outcomes. Annual WISP reviews become genuine opportunities to assess whether controls remain effective as your technology changes. Vendor contract reviews surface providers whose security posture has degraded since onboarding. Incident response tabletop exercises build the procedural muscle memory that determines whether a breach becomes a recoverable event or a practice-ending one.

For tax professionals formalizing their security program, a free WISP template for 2026 provides a structured starting point built to reflect current IRS and FTC requirements. Use it as a framework—then customize every section with your specific software, network architecture, vendor relationships, and staff responsibilities. A template that goes unedited is a compliance gap, not a compliance solution.

Get Your Free 2026 WISP Template

Bellator Cyber Guard's WISP templates are built specifically for tax professionals and updated to reflect current IRS Publication 5708 and FTC Safeguards Rule requirements.

Book a Free Tax Practice Security Assessment

Our security specialists evaluate your current WISP, identify compliance gaps against IRS and FTC requirements, and deliver a prioritized remediation plan—at no cost.

Frequently Asked Questions

A Written Information Security Plan (WISP) is a documented cybersecurity program required of all tax professionals under the Gramm-Leach-Bliley Act and FTC Safeguards Rule (16 CFR Part 314). Tax preparers, CPAs, enrolled agents, and accounting firms are classified as financial institutions under GLBA, which obligates them to protect nonpublic personal information—including Social Security numbers, income data, and financial account details—with specific administrative, technical, and physical safeguards. The IRS reinforces this mandate through Publication 4557 and requires attestation of compliance during PTIN renewal.

No. The 5,000-consumer threshold in FTC regulations reduces documentation requirements for specific subsections but does not eliminate the obligation to implement an information security program. Solo practitioners preparing returns for even a single client must maintain documented security programs covering all nine core WISP elements. The exemption reduces paperwork on certain documentation requirements; it does not waive the underlying security mandate.

The FTC Safeguards Rule section 314.4 requires every covered entity to address: (1) designation of a qualified individual to oversee the program; (2) a documented risk assessment; (3) safeguard design and implementation based on risk findings; (4) written service provider oversight and contracts; (5) regular program evaluation and adjustment; (6) multi-factor authentication for all system access; (7) encryption of customer data in transit and at rest; (8) secure disposal procedures for customer information; and (9) a written incident response plan. Each element requires documentation proportionate to the organization's size and risk profile.

Yes. The August 2024 update to IRS Publication 5708 resolved previous ambiguity by establishing that MFA is required for all users accessing systems containing customer information—regardless of whether access is local or remote. In-office staff accessing tax software, file servers, or cloud applications from within the office network must use MFA. This requirement took effect for the 2026 filing season and applies universally across all practice sizes.

At minimum, review and update your WISP annually. Additional updates are required whenever significant changes occur to your technology environment, business operations, regulatory requirements, or the threat environment. Triggering events include implementing new software, adding employees, changing service providers, experiencing a security incident, or when the IRS or FTC issues updated guidance. A WISP that describes systems you no longer use or omits controls you have implemented does not meet regulatory standards.

FTC enforcement actions can result in penalties starting at $50,000 per violation under the Safeguards Rule, with additional state-level penalties in many jurisdictions. Tax professionals who falsely certify compliance with security requirements during PTIN renewal face federal fraud charges under 18 U.S.C. § 1001. Beyond regulatory penalties, data breaches carry an average cost of $4.88 million per incident according to the IBM Cost of Data Breach Report 2024—a figure that includes remediation, legal costs, regulatory fines, and client notification expenses.

Templates provide a useful structural starting point, but every WISP must be customized to reflect your specific practice operations, technology environment, vendor relationships, and physical locations. Regulators evaluate whether your documented controls match your actual security practices—generic template language that does not reflect your real systems or procedures does not satisfy the requirement. Use a template as a framework, then customize every section with your specific software applications, network architecture, and staff responsibilities.

Your incident response plan must define what constitutes a security incident, establish roles and responsibilities for each team member, provide step-by-step response procedures, specify notification requirements for affected clients and regulators (typically within 72 hours of discovery), include procedures for containing incidents and preserving forensic evidence, address how to determine scope and impact through analysis, and cover system restoration and corrective action. Test the plan at least annually through tabletop exercises and update it based on lessons learned from each test.

The FTC Safeguards Rule requires tax practices to select service providers that maintain appropriate safeguards for customer information and to mandate those safeguards through written contracts. This applies to tax software vendors, cloud storage providers, IT support firms, payroll processors, and any third party accessing customer data on your behalf. Contracts must specifically address security obligations, data handling requirements, breach notification procedures, and audit rights. Annual reassessment of vendor security posture—through SOC 2 Type II reports, security questionnaires, or direct assessment—is now considered regulatory best practice.

Share

Share on X
Share on LinkedIn
Share on Facebook
Send via Email
Copy URL
(800) 492-6076
Share

Schedule

Need help with IRS compliance?

Our tax cybersecurity specialists can review your security posture and help you get compliant.

Protect your tax practice from cyber threats

Schedule a free consultation to assess your firm's security posture.