Bellator Cyber Guard
IRS Required

Incident response planning for tax professionals

The IRS requires every tax preparer to have a documented incident response plan. Learn the six phases of incident response, what the IRS mandates, and how to build a plan that protects your practice when a breach occurs.

The Case for Readiness

Why every tax practice needs an incident response plan

A data breach at a tax practice is not a matter of if, but when. The IRS reported that identity theft-related tax fraud attempts exceeded $5.7 billion in recent years, and tax professionals remain one of the primary vectors for stolen taxpayer data.

When a breach occurs, the difference between a firm that survives and one that does not often comes down to whether they had a plan in place. Without documented response procedures, teams panic, critical evidence is destroyed, notification deadlines are missed, and the financial and reputational damage multiplies.

An incident response plan gives your team a clear, rehearsed set of actions to take under pressure. It reduces response time, limits data exposure, satisfies regulatory requirements, and demonstrates to clients and regulators that you take data protection seriously. The IRS views having a tested incident response plan as a core component of your WISP and a non-negotiable requirement for tax professionals.

Regulatory Framework

IRS and federal requirements

Multiple federal regulations require tax professionals to maintain an incident response plan. Here are the key mandates you must satisfy.

IRS Publication 4557 Mandate

IRS Publication 4557 explicitly requires all tax professionals to have an incident response plan as part of their Written Information Security Plan. The publication states that preparers must have documented procedures for responding to a security incident involving taxpayer data.

IRS Notification Requirements

If taxpayer data is compromised, you must report the breach to your local IRS Stakeholder Liaison. You can also file a report with the Treasury Inspector General for Tax Administration (TIGTA). The IRS Identity Protection Specialized Unit can help place identity protection PINs on affected clients' accounts.

FTC Safeguards Rule Compliance

The revised FTC Safeguards Rule (effective June 2023) requires financial institutions, including tax preparers, to establish and maintain an incident response plan. The plan must address the goals, internal processes, and defined roles for responding to security events.

State Breach Notification Laws

All 50 states, the District of Columbia, and U.S. territories have breach notification laws. These laws require you to notify affected individuals within a specified timeframe (typically 30 to 90 days) if their personal information is compromised. Some states also require notification to the state Attorney General.

The Framework

The 6 phases of incident response

Based on the NIST Computer Security Incident Handling Guide (SP 800-61), these six phases form the backbone of any effective incident response plan.

1

Preparation

This is everything you do before an incident occurs. Your preparation phase includes creating and maintaining this incident response plan, designating your response team (even if that team is just you), establishing communication channels, training staff on recognizing incidents, and ensuring you have the tools and vendor relationships in place to respond effectively. For tax practices, preparation also means having your IRS PTIN holder contact information readily accessible and knowing the IRS Identity Protection Specialized Unit phone number.

Designate an Incident Response Coordinator
Maintain an up-to-date contact list for all team members and vendors
Document your IT infrastructure and data flow maps
Establish relationships with cybersecurity incident response vendors
Keep offline copies of your incident response plan
2

Identification

The identification phase is about detecting and confirming that a security incident has occurred. In a tax practice, signs of an incident include unexpected e-file rejections (which may indicate stolen EFINs), clients reporting they did not file returns, unusual system slowdowns, antivirus alerts, unexplained outbound network traffic, or employees receiving suspicious password reset emails. Not every alert is an incident, so this phase also involves triaging and determining the severity of what you are seeing.

Monitor security alerts from endpoint protection and email filtering
Track e-file rejection patterns for signs of identity theft
Investigate reports from clients about unexpected IRS correspondence
Document the date, time, and nature of every suspected incident
Classify the severity level to determine the appropriate response
3

Containment

Once you confirm an incident, your immediate goal is to stop the bleeding without destroying evidence. Short-term containment might mean disconnecting an infected computer from the network, disabling a compromised user account, or blocking a malicious IP address. Long-term containment involves bringing temporary systems online so your practice can continue operating while you work on eradication. For tax firms during filing season, containment must balance security with the urgent need to maintain operations.

Isolate affected systems from the network immediately
Change passwords for all potentially compromised accounts
Disable VPN and remote access if the breach vector is external
Preserve system logs and forensic evidence before making changes
Activate backup systems to maintain business continuity
4

Eradication

With the incident contained, you now remove the threat entirely. This means identifying the root cause of the breach, removing all malware from affected systems, closing the vulnerability that allowed the attack, and verifying that no backdoors or persistence mechanisms remain. In many cases, the safest approach for tax practices is to wipe and rebuild affected machines from clean images rather than attempting to clean them in place.

Identify and eliminate the root cause of the incident
Remove all malware, unauthorized accounts, and backdoors
Patch the vulnerability that was exploited
Scan all systems for indicators of compromise
Rebuild compromised systems from known-clean backups or images
5

Recovery

Recovery is the careful process of returning your practice to normal operations. Restore systems from verified-clean backups, bring services back online in a controlled order, and monitor closely for any signs that the threat persists. For tax practices, this includes verifying the integrity of taxpayer data, confirming that e-filing systems are functioning correctly, and ensuring no fraudulent returns were submitted using stolen client data.

Restore data from clean, verified backups
Bring systems back online in a prioritized order
Monitor restored systems intensively for signs of reinfection
Verify the integrity of all taxpayer records and filed returns
Confirm e-filing capabilities are restored and functioning
6

Lessons Learned

Within two weeks of resolving the incident, conduct a formal post-incident review. Document what happened, what worked well in your response, what did not, and what specific changes you will make to prevent a recurrence. This review must be documented and retained as part of your WISP. The IRS expects to see evidence that you learn from security events and continuously improve your security program.

Conduct a formal post-incident review meeting
Document the complete timeline and root cause analysis
Identify gaps in your security program that allowed the incident
Update your WISP and incident response plan based on findings
Schedule additional training if human error was a contributing factor

Template

What our incident response plan template includes

Our WISP template includes a complete incident response plan section with everything you need to be IRS-compliant and operationally prepared.

Incident response team roster with contact information and roles
Incident classification matrix with severity levels
Step-by-step containment procedures for common incident types
IRS and law enforcement notification contact details and procedures
Client notification letter templates for data breach situations
Evidence preservation and chain-of-custody documentation forms
Business continuity procedures during incident response
Post-incident review checklist and report template

Build your incident response plan today

Do not wait until a breach forces you to improvise. Get our WISP template with a built-in incident response plan, or let our team build a custom plan for your practice.