IRS Publication 1075
IRS Tax Information Security Guidelines. Required for federal/state/local agencies handling Federal Tax Information.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (169)
Exhibit 6
| Code | Title |
|---|---|
| PUB1075-SCSEM | Safeguard Computer Security Evaluation Matrix |
Exhibit 7
| Code | Title |
|---|---|
| PUB1075-CONTRACTOR-LANGUAGE | Exhibit 7 Contract Language for Contractors |
Section 1.4.7
| Code | Title |
|---|---|
| PUB1075-OFFSHORE | Prohibition on Offshore Access |
Section 10
| Code | Title |
|---|---|
| PUB1075-IMPROPER-DISCLOSURE | Reporting Improper Inspections or Disclosures |
Section 4.3
| Code | Title |
|---|---|
| PUB1075-PRINT-CONTROL | FTI Printout Inventory and Destruction |
Section 4.4
| Code | Title |
|---|---|
| PUB1075-COMMINGLING | FTI Commingling Identification |
Section 6.2
| Code | Title |
|---|---|
| PUB1075-NDA | Non-Disclosure Agreements |
Section 6.3
| Code | Title |
|---|---|
| PUB1075-DISCLOSURE-AWARENESS | Disclosure Awareness Training |
Section 7.1
| Code | Title |
|---|---|
| PUB1075-SAFEGUARDS-SSR | Safeguard Security Report (SSR) |
Section 7.2
| Code | Title |
|---|---|
| PUB1075-SAFEGUARDS-REPORTING | Safeguard Activity Report (SAR) |
Section 7.3
| Code | Title |
|---|---|
| PUB1075-SAFEGUARDS-REVIEW | On-Site Safeguard Review |
Section 7.4
| Code | Title |
|---|---|
| PUB1075-SAFEGUARDS-CAP | Corrective Action Plan (CAP) |
Section 7.5
| Code | Title |
|---|---|
| PUB1075-DATA-WAREHOUSE | Data Warehouse Notification |
Section 9.3.1.1
| Code | Title |
|---|---|
| AC-1 | Policy and Procedures |
Section 9.3.1.10
| Code | Title |
|---|---|
| AC-12 | Session Termination |
Section 9.3.1.11
| Code | Title |
|---|---|
| AC-14 | Permitted Actions Without Identification or Authentication |
Section 9.3.1.12
| Code | Title |
|---|---|
| AC-17 | Remote Access |
| AC-17(2) | Protection of Confidentiality and Integrity Using Encryption |
Section 9.3.1.13
| Code | Title |
|---|---|
| AC-18 | Wireless Access |
Section 9.3.1.14
| Code | Title |
|---|---|
| AC-19 | Access Control for Mobile Devices |
Section 9.3.1.15
| Code | Title |
|---|---|
| AC-20 | Use of External Systems |
Section 9.3.1.16
| Code | Title |
|---|---|
| AC-21 | Information Sharing |
Section 9.3.1.17
| Code | Title |
|---|---|
| AC-22 | Publicly Accessible Content |
Section 9.3.1.2
| Code | Title |
|---|---|
| AC-2 | Account Management |
| AC-2(1) | Automated System Account Management |
| AC-2(3) | Disable Accounts |
| AC-2(5) | Inactivity Logout |
Section 9.3.1.3
| Code | Title |
|---|---|
| AC-3 | Access Enforcement |
Section 9.3.1.4
| Code | Title |
|---|---|
| AC-4 | Information Flow Enforcement |
Section 9.3.1.5
| Code | Title |
|---|---|
| AC-5 | Separation of Duties |
Section 9.3.1.6
| Code | Title |
|---|---|
| AC-6 | Least Privilege |
| AC-6(9) | Log Use of Privileged Functions |
Section 9.3.1.7
| Code | Title |
|---|---|
| AC-7 | Unsuccessful Logon Attempts |
Section 9.3.1.8
| Code | Title |
|---|---|
| AC-8 | System Use Notification |
Section 9.3.1.9
| Code | Title |
|---|---|
| AC-11 | Device Lock |
Section 9.3.10.1
| Code | Title |
|---|---|
| MP-1 | Policy and Procedures |
Section 9.3.10.2
| Code | Title |
|---|---|
| MP-2 | Media Access |
Section 9.3.10.3
| Code | Title |
|---|---|
| MP-3 | Media Marking |
Section 9.3.10.4
| Code | Title |
|---|---|
| MP-4 | Media Storage |
Section 9.3.10.5
| Code | Title |
|---|---|
| MP-5 | Media Transport |
Section 9.3.10.6
| Code | Title |
|---|---|
| MP-6 | Media Sanitization |
Section 9.3.10.7
| Code | Title |
|---|---|
| MP-7 | Media Use |
Section 9.3.11.1
| Code | Title |
|---|---|
| PE-1 | Policy and Procedures |
Section 9.3.11.10
| Code | Title |
|---|---|
| PE-11 | Emergency Power |
Section 9.3.11.11
| Code | Title |
|---|---|
| PE-12 | Emergency Lighting |
Section 9.3.11.12
| Code | Title |
|---|---|
| PE-13 | Fire Protection |
Section 9.3.11.13
| Code | Title |
|---|---|
| PE-14 | Environmental Controls |
Section 9.3.11.14
| Code | Title |
|---|---|
| PE-15 | Water Damage Protection |
Section 9.3.11.15
| Code | Title |
|---|---|
| PE-16 | Delivery and Removal |
Section 9.3.11.16
| Code | Title |
|---|---|
| PE-17 | Alternate Work Site |
Section 9.3.11.17
| Code | Title |
|---|---|
| PE-18 | Location of System Components |
Section 9.3.11.2
| Code | Title |
|---|---|
| PE-2 | Physical Access Authorizations |
Section 9.3.11.3
| Code | Title |
|---|---|
| PE-3 | Physical Access Control |
Section 9.3.11.4
| Code | Title |
|---|---|
| PE-4 | Access Control for Transmission |
Section 9.3.11.5
| Code | Title |
|---|---|
| PE-5 | Access Control for Output Devices |
Section 9.3.11.6
| Code | Title |
|---|---|
| PE-6 | Monitoring Physical Access |
Section 9.3.11.7
| Code | Title |
|---|---|
| PE-8 | Visitor Access Records |
Section 9.3.11.8
| Code | Title |
|---|---|
| PE-9 | Power Equipment and Cabling |
Section 9.3.11.9
| Code | Title |
|---|---|
| PE-10 | Emergency Shutoff |
Section 9.3.12.1
| Code | Title |
|---|---|
| PL-1 | Policy and Procedures |
Section 9.3.12.2
| Code | Title |
|---|---|
| PL-2 | System Security and Privacy Plans |
Section 9.3.12.3
| Code | Title |
|---|---|
| PL-4 | Rules of Behavior |
Section 9.3.13.1
| Code | Title |
|---|---|
| PS-1 | Policy and Procedures |
Section 9.3.13.2
| Code | Title |
|---|---|
| PS-2 | Position Risk Designation |
Section 9.3.13.3
| Code | Title |
|---|---|
| PS-3 | Personnel Screening |
Section 9.3.13.4
| Code | Title |
|---|---|
| PS-4 | Personnel Termination |
Section 9.3.13.5
| Code | Title |
|---|---|
| PS-5 | Personnel Transfer |
Section 9.3.13.6
| Code | Title |
|---|---|
| PS-6 | Access Agreements |
Section 9.3.13.7
| Code | Title |
|---|---|
| PS-7 | External Personnel Security |
Section 9.3.13.8
| Code | Title |
|---|---|
| PS-8 | Personnel Sanctions |
Section 9.3.14.1
| Code | Title |
|---|---|
| RA-1 | Policy and Procedures |
Section 9.3.14.2
| Code | Title |
|---|---|
| RA-2 | Security Categorization |
Section 9.3.14.3
| Code | Title |
|---|---|
| RA-3 | Risk Assessment |
Section 9.3.14.4
| Code | Title |
|---|---|
| RA-5 | Vulnerability Monitoring and Scanning |
Section 9.3.14.5
| Code | Title |
|---|---|
| RA-7 | Identifies and Analyzes Risk |
Section 9.3.15.1
| Code | Title |
|---|---|
| SA-1 | Logging and Monitoring |
Section 9.3.15.2
| Code | Title |
|---|---|
| SA-4 | Acquisition Process |
Section 9.3.15.3
| Code | Title |
|---|---|
| SA-5 | System Documentation |
Section 9.3.15.4
| Code | Title |
|---|---|
| SA-8 | Security and Privacy Engineering Principles |
Section 9.3.15.5
| Code | Title |
|---|---|
| SA-9 | External System Services |
Section 9.3.15.6
| Code | Title |
|---|---|
| SA-11 | Developer Testing and Evaluation |
Section 9.3.16.1
| Code | Title |
|---|---|
| SC-1 | Policy and Procedures |
Section 9.3.16.10
| Code | Title |
|---|---|
| SC-15 | Collaborative Computing Devices and Applications |
Section 9.3.16.11
| Code | Title |
|---|---|
| SC-17 | Public Key Infrastructure Certificates |
Section 9.3.16.12
| Code | Title |
|---|---|
| SC-18 | Mobile Code |
Section 9.3.16.13
| Code | Title |
|---|---|
| SC-20 | Secure Name/Address Resolution Service (Authoritative) |
Section 9.3.16.14
| Code | Title |
|---|---|
| SC-21 | Secure Name/Address Resolution Service (Recursive or Caching Resolver) |
Section 9.3.16.15
| Code | Title |
|---|---|
| SC-22 | Architecture and Provisioning for Name/Address Resolution Service |
Section 9.3.16.16
| Code | Title |
|---|---|
| SC-23 | Session Authenticity |
Section 9.3.16.17
| Code | Title |
|---|---|
| SC-28 | Protection of Information at Rest |
Section 9.3.16.18
| Code | Title |
|---|---|
| SC-39 | Process Isolation |
Section 9.3.16.2
| Code | Title |
|---|---|
| SC-2 | Separation of System and User Functionality |
Section 9.3.16.3
| Code | Title |
|---|---|
| SC-4 | Information in Shared System Resources |
Section 9.3.16.4
| Code | Title |
|---|---|
| SC-5 | Denial-of-Service Protection |
Section 9.3.16.5
| Code | Title |
|---|---|
| SC-7 | Boundary Protection |
Section 9.3.16.6
| Code | Title |
|---|---|
| SC-8 | Transmission Confidentiality and Integrity |
Section 9.3.16.7
| Code | Title |
|---|---|
| SC-10 | Network Disconnect |
Section 9.3.16.8
| Code | Title |
|---|---|
| SC-12 | Cryptographic Key Establishment and Management |
Section 9.3.16.9
| Code | Title |
|---|---|
| SC-13 | Cryptographic Protection |
Section 9.3.17.1
| Code | Title |
|---|---|
| SI-1 | Policy and Procedures |
Section 9.3.17.10
| Code | Title |
|---|---|
| SI-12 | Information Management and Retention |
Section 9.3.17.11
| Code | Title |
|---|---|
| SI-16 | Memory Protection |
Section 9.3.17.2
| Code | Title |
|---|---|
| SI-2 | Flaw Remediation |
Section 9.3.17.3
| Code | Title |
|---|---|
| SI-3 | Malicious Code Protection |
Section 9.3.17.4
| Code | Title |
|---|---|
| SI-4 | System Monitoring |
Section 9.3.17.5
| Code | Title |
|---|---|
| SI-5 | Security Alerts, Advisories, and Directives |
Section 9.3.17.6
| Code | Title |
|---|---|
| SI-7 | Software, Firmware, and Information Integrity |
Section 9.3.17.7
| Code | Title |
|---|---|
| SI-8 | Spam Protection |
Section 9.3.17.8
| Code | Title |
|---|---|
| SI-10 | Information Input Validation |
Section 9.3.17.9
| Code | Title |
|---|---|
| SI-11 | Error Handling |
Section 9.3.2.1
| Code | Title |
|---|---|
| AT-1 | Policy and Procedures |
Section 9.3.2.2
| Code | Title |
|---|---|
| AT-2 | Literacy Training and Awareness |
Section 9.3.2.3
| Code | Title |
|---|---|
| AT-3 | Role-Based Training |
Section 9.3.2.4
| Code | Title |
|---|---|
| AT-4 | Training Records |
Section 9.3.3.1
| Code | Title |
|---|---|
| AU-1 | Policy and Procedures |
Section 9.3.3.10
| Code | Title |
|---|---|
| AU-11 | Audit Record Retention |
Section 9.3.3.11
| Code | Title |
|---|---|
| AU-12 | Audit Record Generation |
Section 9.3.3.2
| Code | Title |
|---|---|
| AU-2 | Event Logging |
Section 9.3.3.3
| Code | Title |
|---|---|
| AU-3 | Content of Audit Records |
Section 9.3.3.4
| Code | Title |
|---|---|
| AU-4 | Audit Log Storage Capacity |
Section 9.3.3.5
| Code | Title |
|---|---|
| AU-5 | Response to Audit Logging Process Failures |
Section 9.3.3.6
| Code | Title |
|---|---|
| AU-6 | Audit Record Review, Analysis, and Reporting |
Section 9.3.3.7
| Code | Title |
|---|---|
| AU-7 | Audit Record Reduction and Report Generation |
Section 9.3.3.8
| Code | Title |
|---|---|
| AU-8 | Time Stamps |
Section 9.3.3.9
| Code | Title |
|---|---|
| AU-9 | Protection of Audit Information |
Section 9.3.4.1
| Code | Title |
|---|---|
| CA-1 | Policy and Procedures |
Section 9.3.4.2
| Code | Title |
|---|---|
| CA-2 | Control Assessments |
Section 9.3.4.3
| Code | Title |
|---|---|
| CA-3 | Information Exchange |
Section 9.3.4.4
| Code | Title |
|---|---|
| CA-5 | Plan of Action and Milestones |
Section 9.3.4.5
| Code | Title |
|---|---|
| CA-6 | Authorization |
Section 9.3.4.6
| Code | Title |
|---|---|
| CA-7 | Continuous Monitoring |
Section 9.3.4.7
| Code | Title |
|---|---|
| CA-8 | Penetration Testing |
Section 9.3.4.8
| Code | Title |
|---|---|
| CA-9 | Internal System Connections |
Section 9.3.5.1
| Code | Title |
|---|---|
| CM-1 | Policy and Procedures |
Section 9.3.5.10
| Code | Title |
|---|---|
| CM-11 | User-Installed Software |
Section 9.3.5.2
| Code | Title |
|---|---|
| CM-2 | Baseline Configuration |
Section 9.3.5.3
| Code | Title |
|---|---|
| CM-3 | Configuration Change Control |
Section 9.3.5.4
| Code | Title |
|---|---|
| CM-4 | Impact Analyses |
Section 9.3.5.5
| Code | Title |
|---|---|
| CM-5 | Access Restrictions for Change |
Section 9.3.5.6
| Code | Title |
|---|---|
| CM-6 | Configuration Settings |
Section 9.3.5.7
| Code | Title |
|---|---|
| CM-7 | Least Functionality |
Section 9.3.5.8
| Code | Title |
|---|---|
| CM-8 | System Component Inventory |
Section 9.3.5.9
| Code | Title |
|---|---|
| CM-10 | Software Usage Restrictions |
Section 9.3.6.1
| Code | Title |
|---|---|
| CP-1 | Policy and Procedures |
Section 9.3.6.2
| Code | Title |
|---|---|
| CP-2 | Contingency Plan |
Section 9.3.6.3
| Code | Title |
|---|---|
| CP-3 | Contingency Training |
Section 9.3.6.4
| Code | Title |
|---|---|
| CP-4 | Contingency Plan Testing |
Section 9.3.6.5
| Code | Title |
|---|---|
| CP-6 | Alternate Storage Site |
Section 9.3.6.6
| Code | Title |
|---|---|
| CP-7 | Alternate Processing Site |
Section 9.3.6.7
| Code | Title |
|---|---|
| CP-8 | Telecommunications Services |
Section 9.3.6.8
| Code | Title |
|---|---|
| CP-9 | System Backup |
Section 9.3.6.9
| Code | Title |
|---|---|
| CP-10 | System Recovery and Reconstitution |
Section 9.3.7.1
| Code | Title |
|---|---|
| IA-1 | Policy and Procedures |
Section 9.3.7.2
| Code | Title |
|---|---|
| IA-2 | Identification and Authentication (Organizational Users) |
| IA-2(12) | Acceptance of PIV Credentials |
Section 9.3.7.3
| Code | Title |
|---|---|
| IA-3 | Device Identification and Authentication |
Section 9.3.7.4
| Code | Title |
|---|---|
| IA-4 | Identifier Management |
Section 9.3.7.5
| Code | Title |
|---|---|
| IA-5 | Authenticator Management |
| IA-5(1) | Password-Based Authentication |
Section 9.3.7.6
| Code | Title |
|---|---|
| IA-6 | Authentication Feedback |
Section 9.3.7.7
| Code | Title |
|---|---|
| IA-7 | Cryptographic Module Authentication |
Section 9.3.7.8
| Code | Title |
|---|---|
| IA-8 | Identification and Authentication (Non-Organizational Users) |
Section 9.3.8.1
| Code | Title |
|---|---|
| IR-1 | Event Detection and Triage |
Section 9.3.8.2
| Code | Title |
|---|---|
| IR-2 | Incident Response and Recovery |
Section 9.3.8.3
| Code | Title |
|---|---|
| IR-3 | Continuity of Operations |
Section 9.3.8.4
| Code | Title |
|---|---|
| IR-4 | Incident Handling |
Section 9.3.8.5
| Code | Title |
|---|---|
| IR-5 | Incident Monitoring |
Section 9.3.8.6
| Code | Title |
|---|---|
| IR-6 | Incident Reporting |
Section 9.3.8.7
| Code | Title |
|---|---|
| IR-7 | Incident Response Assistance |
Section 9.3.8.8
| Code | Title |
|---|---|
| IR-8 | Incident Response Plan |
Section 9.3.9.1
| Code | Title |
|---|---|
| MA-1 | Policy and Procedures |
Section 9.3.9.2
| Code | Title |
|---|---|
| MA-2 | Controlled Maintenance |
Section 9.3.9.3
| Code | Title |
|---|---|
| MA-3 | Maintenance Tools |
Section 9.3.9.4
| Code | Title |
|---|---|
| MA-4 | Nonlocal Maintenance |
Section 9.3.9.5
| Code | Title |
|---|---|
| MA-5 | Maintenance Personnel |
Section 9.4 / Exhibit 16
| Code | Title |
|---|---|
| PUB1075-CLOUD-FEDRAMP | Cloud Computing and FedRAMP |
Your Compliance Coverage
If you comply with IRS Publication 1075, you already cover:
Australia eSafety Commissioner — Online Safety Expectations for Industry
4%
7 controls mapped
Compare →GLI-33 — Gaming Laboratories International Event Wagering Systems
4%
7 controls mapped
Compare →Singapore Government Instruction Manual on ICT&SS Management (IM8)
3%
6 controls mapped
Compare →+ 615 more: ASEAN Data Management Framework (3%), NIST SP 800-190 (3%)
See all 618 mapped frameworks ↓Maps to 618 other frameworks
Frequently Asked Questions
What is IRS Publication 1075?
IRS Publication 1075 is a compliance framework from United States with 169 domains and 176 controls. IRS Tax Information Security Guidelines. Required for federal/state/local agencies handling Federal Tax Information. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does IRS Publication 1075 have?
IRS Publication 1075 has 176 controls organised across 169 domains. The largest domains are Section 9.3.1.2 (4 controls), Section 9.3.1.12 (2 controls), Section 9.3.1.6 (2 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does IRS Publication 1075 map to?
IRS Publication 1075 maps to 618 other compliance frameworks. The top mapping partners are Australia eSafety Commissioner — Online Safety Expectations for Industry (4% coverage), GLI-33 — Gaming Laboratories International Event Wagering Systems (4% coverage), Singapore Government Instruction Manual on ICT&SS Management (IM8) (3% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with IRS Publication 1075 compliance?
Start your IRS Publication 1075 compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about IRS Publication 1075 requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 176 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 769 frameworks.
Get Started Free →Free forever — no credit card required