- 10.2.14 Methods of Providing Protection
- 10.2.14.1 Program Scope and Objectives
- 10.2.14.1.1 Background
- 10.2.14.1.2 Authority
- 10.2.14.1.3 Roles and Responsibilities
- 10.2.14.1.4 Program Management and Review
- 10.2.14.1.5 Program Controls
- 10.2.14.1.6 Terms and Acronyms
- 10.2.14.1.7 Related Resources
- 10.2.14.2 Protecting Facilities and Personnel
- 10.2.14.2.1 Detection Systems
- 10.2.14.2.2 Intrusion Detection Systems and Duress Alarms
- 10.2.14.2.3 Video Surveillance Systems (VSS)
- 10.2.14.2.4 Video Analytics Software
- 10.2.14.2.5 Access Control
- 10.2.14.2.6 Locks
- 10.2.14.2.7 Security Section Chief (SSC) Key Control Responsibilities
- 10.2.14.2.8 Key Control Officer (KCO)
- 10.2.14.2.9 Key Control and Safeguarding
- 10.2.14.2.10 Enterprise Physical Access Control System (EPACS)
- 10.2.14.2.11 Separating Employee Clearance (SEC) - Accounting for Access Control Cards and Keys
- 10.2.14.2.12 Mail Security
- 10.2.14.2.13 X-ray Machines
- 10.2.14.2.14 Design for Blast Protection
- 10.2.14.2.15 Drop Boxes
- 10.2.14.2.16 Workforce Safety and Security
- 10.2.14.2.17 Receptacle and Container Placement
- 10.2.14.2.18 Heightened Security Alerts
- 10.2.14.3 Protecting Assets
- 10.2.14.3.1 Protected Items / Information
- 10.2.14.3.2 Normal Security
- 10.2.14.3.3 Locked Containers
- 10.2.14.3.4 Security Containers
- 10.2.14.3.5 Security Areas
- 10.2.14.3.6 Combination Control and Safeguarding
- 10.2.14.3.7 Clean Desk Policy
- 10.2.14.4 Contract Security Services
- 10.2.14.4.1 Protective Security Officers (PSO)
- 10.2.14.4.2 Explosive Detection Canine Program (EDCP)
- 10.2.14.5 Security Reporting
- 10.2.14.5.1 Security Hazards
- 10.2.14.5.2 Suspicious Activity/Items
- 10.2.14.6 Photography and Video Recordings Prohibition
- 10.2.14.1 Program Scope and Objectives
Part 10. Security, Privacy, Assurance and Artificial Intelligence
Chapter 2. Physical Security Program
Section 14. Methods of Providing Protection
10.2.14 Methods of Providing Protection
Manual Transmittal
April 24, 2025
Purpose
(1) This transmits revised IRM 10.2.14, Physical Security Program, Methods of Providing Protection.
Material Changes
(1) This IRM was updated to reflect current organizational titles, scope, definitions, responsibilities, terminology, references, and authorized use.
(2) Throughout the IRM, updated the following terms:
-
Security area to limited/controlled area.
-
Guard service to Protective Security Officers (PSO).
-
References to OSGetServices-KISAM to the new system IRS Service Central-IRWorks.
(3) IRM 10.2.14.1.4, Program Management and Review:
-
Paragraph (1), Updated program reports to provide a description of how the program is managed.
-
Paragraph (2), Added implementation of effective security countermeasures to Program Effectiveness.
(4) IRM 10.2.14.1.5, Program Controls: Added subsection to provide control that management uses to oversee the program.
(5) IRM 10.2.14.2, Protecting Facilities and Personnel: Clarified facility perimeter and security barriers.
(6) IRM 10.2.14.2.2, Intrusion Detection Systems and Duress Alarms: Included keypad operations and procedures.
(7) IRM 10.2.14.2.3 (3), Video Surveillance Systems (VSS): Added that cameras must be placed so personally identifiable information (PII) and federal taxpayer information (FTI) are not observable.
(8) IRM 10.2.14.2.5, Access Control:
-
Paragraph (1), Added definition of Enterprise Physical Access Control System (EPACS).
-
Paragraph (2), Added policy that facilities equipped with EPACS must utilize this system as the primary method for gaining access.
(9) IRM 10.2.14.2.10, Enterprise Physical Access Control System (EPACS): Added clarity of EPACS system to align with IRM 10.2.18.
(10) IRM 10.2.14.2.11, Separating Employee Clearance (SEC) - Accounting for Access Control Cards /Keys: Removed TIGTA from list of who needs to be notified when facility access, limited/controlled area doors, and master keys are unrecovered.
(11) IRM 10.2.14.2.12, Mail Security: Removed paragraph (4) listing features of a suspicious package and paragraph (5) on procedures for handling suspicious letters and packages.
(12) IRM 10.2.14.2.17, Receptacle and Container Placement: Added in accordance with ISC Standards to identify authority.
(13) IRM 10.2.14.6, Locks: Security area access door lock keys must be tracked in the Key Control Inventory.
Effect on Other Documents
This IRM supersedes IRM 10.2.14 dated January 10, 2023Audience
ServicewideEffective Date
(04-24-2025)Julia W. Caldwell
Acting Chief
Facilities Management and Security Services
-
This IRM section applies to the physical security countermeasures to be used for the protection of IRS facilities, personnel, and assets. Utilizing the principle of ¡°security in depth,¡± security begins at the outermost perimeter fence line, or entry point into IRS space and inward to establish and integrate security countermeasures. The IRS provides the baseline level of protection for all facilities, based on the current Facility Security Level (FSL) and in accordance with Interagency Security Committee (ISC) standards.
-
Purpose: This IRM establishes the framework for applying physical security countermeasures to protect IRS facilities, personnel, and assets.
-
Audience: Servicewide
-
Policy Owner: Chief, Facilities Management and Security Services (FMSS).
-
Program Owner: FMSS Associate Director (AD), Security.
-
Primary Stakeholders: FMSS Field Operations, Business Unit (BU) Executives, Senior Managers, Chief Counsel Executives, Managers, and Employees.
-
Program Goals: To ensure the protection of IRS facilities, personnel, and assets through implementation of policies and procedures.
-
To comply with the Department of the Treasury, ISC, and IRS protection policies and standards, the IRS has established physical security methods of providing protection to protect IRS facilities, personnel, and assets.
-
, June 15, 2011
-
Homeland Security Presidential Directive (HSPD): Policy for a Common Identification (ID) Standard for Federal Employees and Contractors
-
, Treasury Security Manual - Treasury Security Functions and Programs
-
, Insider Threat Program
-
The Chief, FMSS prescribes and oversees methods of providing protection policies and guidance.
-
FMSS AD, Security:
-
Oversees planning, developing, evaluating, and controlling methods of providing protection policies and guidance.
-
Serves as approving authority for any deviation to existing security policies.
-
Reviews and evaluates Form 14675, Decision Making Framework Risk Acceptance Form and Tool (RAFT) submitted from AD Ops.
-
-
BU managers must determine what assets and information within their unit require additional protection using the methods outlined in this policy and implement appropriate protection.
-
FMSS Operations ADs and Territory Managers (TM) direct FMSS Security Section Chiefs (SSC) and oversee the implementation of this IRM.
-
FMSS SSCs in each territory implement and enforce IRS policy and procedures for physical security issues within their assigned territory.
-
All IRS managers:
-
Inform assigned employees of the importance of adhering to facility security policies and practices.
-
Maintain awareness of physical security requirements within IRM 10.2, Physical Security Program, series.
-
Purchase GSA-approved security containers required to support BU needs and ensure they are marked and maintained in accordance with requirements.
-
Initiate Personnel Action Requests (PARs) and Separating Employee Clearance (SEC) actions in HRConnect.
-
-
All employees and contractor employees must:
-
Comply with established security policies, practices, and procedures.
-
Report security hazards and inoperative security equipment to assigned Physical Security staff, Protective Security Officers (PSO), or submit an IRS Service Central (IRWorks) request from the IRS Source homepage (Select Workplace, Physical Security, and select relevant reporting area).
-
-
Program Reports:
-
FMSS Security reports located in Security+ which tracks annual submissions.
-
FMSS Facility Security Compliance Assessment (FSCA) tracks IRS compliance in conjunction with FPS Facility Security Assessments, conducted on a three or five year cycle.
-
FMSS Security Countermeasure Tracking (CMT) Tool tracks and manages countermeasure recommendations from security assessments and audit findings conducted on a monthly basis at a minimum.
-
FMSS Security Key Control Program tracks FMSS security managed keys, annually through Key Control Registry (KCR).
-
-
Program Effectiveness:
-
Timely completion of FMSS Security requirements reporting.
-
Analysis of countermeasures recommendations.
-
Implementation of effective security countermeasures.
-
-
Review security requirement reports located in the system of record to ensure program deliverable are met timely and the SSC is notified of identified deficits.
-
The following terms and acronyms are used throughout this IRM.
Term Definition Auto-deactivation Scheduled automatic deactivation/activation of an Intrusion Detection system. Controlled Area A security area which requires one single authentication mechanism to ensure only authorized personnel have unescorted access. Countermeasure Action, measure, or device intended to reduce an identified risk. Duress Alarms A duress alarm is a wired or wireless communication system that will notify first responders. Incident An occurrence of an action or situation, such as an act of human intervention or act of nature that requires a physical security response. Intrusion Detection System (IDS) Intrusion detection systems (IDS) are designed to detect attempted breaches of perimeter areas. Limited Area A security area to which access is limited to authorized personnel by a two-factor authentication mechanism. Physical Access Control (PAC) Card A photo ID card issued that verifies the identity of the bearer for facility access only. Access Cards Non-photo, electronic cards that work with the access control system to unlock a door or a similar structure, replacing a traditional key and lock. Security Area Consists of either controlled or limited areas, which require individual access authentication to gain entry. Security Hazard A situation which creates a vulnerability to protecting IRS facilities posed by an inoperable or ineffective security countermeasure. Video Surveillance System (VSS) VSS includes cameras, monitors, and video recorders to capture images in an area or around a building that is transmitted over cabling to a recorder, so that the images can be viewed on a monitor in real time or later. Acronym Term AD Associate Director BU Business Unit CAU Caution Upon Contact CI Criminal Investigation CNSI Classified National Security Information DHS Department of Homeland Security EO Executive Order EPACS Enterprise Physical Access Control System FMSS Facilities Management and Security Services FPS Federal Protective Service FSCA Facility Security Compliance Assessment FSA Facility Security Assessment FTI Federal Taxpayer Information GSA General Services Administration IDS Intrusion Detection System ISC Interagency Security Committee KCO Key Control Officer KCR Key Control Registry NARA National Archives and Records Administration OEP Occupant Emergency Plan PAC Physical Access Control PAR Personnel Action Request PBS Public Buildings Service PDT Potentially Dangerous Taxpayer PSO Protective Security Officer SAMC Situational Awareness Management Center SEC Separating Employee Clearance SF Standard Form SSC Security Section Chief TD P Treasury Directive Publication TIGTA Treasury Inspector General for Tax Administration TM Territory Manager USMS United States Marshals Service VSS Video Surveillance System
-
Document 12963, A Guide to the Office of Employee Protection Programs
-
Document 13402, Desk Guide for Workplace Violence Prevention
-
IRM 3.10.72, Receiving, Extracting, and Sorting
-
IRM 1.22.5, Mail Operations
-
IRM 10.2.1, Physical Security
-
IRM 10.2.5, Identification Media
-
IRM 10.2.18, Physical Access Control (PAC)
-
IRM 10.5.1, Privacy and Information Protection, Privacy Policy
-
IRM 10.9.1, Classified National Security Information (CNSI)
-
, Appendix B
-
The protection of facilities and personnel represents the highest IRS priority and includes most of our security programs.
-
A facility¡¯s perimeter is identified by the property boundary which is usually identified by a type of barrier, and may include fences or gates, but will most often consist of the building wall. The barrier, fence, door or gates are security countermeasures which form the first level of security protection.
-
An important contributor to physical security is lighting used as a deterrent to detect intruders, illuminate areas to meet requirements for Video Surveillance System (VSS) coverage, and assist response teams when responding to incidents at night or times of limited visibility.
-
The use of specialized security equipment to detect security breaches is an essential component to providing security-in-depth for IRS facilities such as Intrusion Detection Systems (IDS) and VSS.
-
The IRS utilizes both IDS and duress alarms in IRS facilities. These alarms are tested annually and when deemed necessary, by an FMSS alarm service vendor.
-
For facilities with alarm keypad operations:
-
IDS is armed/disarmed using a keypad with a personal identification number (PIN), unique to the employee operating the alarm and is located in a central location.
-
Physical Security staff provides keypad operational arming/disarming instructions to BU managers, as necessary.
-
Physical Security staff will issue a unique IDS keypad PIN to an IRS employee or contractor with staff-like access after approval by the BU manager. The PIN must not be shared.
-
-
IRS employees who work directly with taxpayers must familiarize themselves with the location and operation of duress alarms.
-
Only assigned FMSS Physical Security personnel or approved contractor employees are authorized to adjust, relocate, or remove security systems and alarms.
-
All issues relating to IDS or duress alarms should be reported to the assigned FMSS Physical Security staff, or as noted below in IRM 10.2.14.5.1, Security Hazards.
-
VSS is an essential IRS physical security countermeasure used for personnel protection, documentation, crime prevention, and investigation. To support these efforts, position and direct VSS viewing fields to achieve the best possible coverage of IRS facilities, properties, or space. Facility or maintenance personnel must trim foliage that obstructs VSS fields of view.
-
FMSS Physical Security determines IRS VSS requirements using security criterion from The Risk Management Process for Federal Facilities: An Interagency Security Committee Standard Appendix B and IRS-FMSS Physical Security Design Manual. VSS layout will vary at each facility, based on its designated FSL and Facility Security Assessment (FSA).
-
Cameras must be placed so the employee, their desktop, and computer screen are not observable to ensure the protection of personally identifiable information (PII) and federal taxpayer information (FTI).
-
Requests for all security recordings will be reviewed and approved or denied by the FMSS SSC or TM.
-
VSS equipment used in IRS facilities must comply with the requirements outlined in H.R. 5515 - John S. McCain National Defense Authorization Act for Fiscal Year 2019 and subsequent federal guidance. Contact the FMSS AD, Security for a comprehensive list of prohibited telecommunications, VSS, equipment, and other items. The approved manufacturers can be found in the Security Scope of Work Template located on the FMSS Security Program¡¯s SharePoint site.
-
In accordance with Document 12829, General Records Schedule (GRS) - 5.6: Security Management Records, published by National Archives and Records Administration (NARA), video surveillance footage will be saved for 30 days. For storage requirements beyond 30 days, SSCs may submit justification via email to FMSS AD, Security.
-
Only authorized video analytics software must be used at IRS facilities.
-
FMSS AD, Security must approve by email, in advance, video analytics software purchases and installations not previously approved and utilized by IRS. The approved manufacturers can be found in the Security Scope of Work Template located on the FMSS Security Program¡¯s SharePoint site.
-
Effective safeguarding of IRS facilities, personnel and assets is reliant upon assuring that only authorized personnel, vehicles, and material are authorized for access and/or exit. Examples of access control include:
-
Key Locks - The potential for keys to be compromised by loss and making unauthorized duplicate keys should be considered when determining the security requirements. Examples of key locks include facility master keys, perimeter door keys, and limited area keys.
-
Combination and Cipher Locks - Utilized for padlocks, vaults, and doors. Combination and cipher-locks are easy to use but require additional handling and maintenance by the BU. Examples of combination locks could include door cipher locks, security containers, safes, and vaults. Use combination locks sparingly and only within interior areas at facilities where access is essential at its perimeter.
-
Enterprise Physical Access Control System (EPACS) - Allows access for authorized IRS employees, IRS contractors, and federal employees, who enters IRS facilities/controlled space. EPACS denies access to unauthorized personnel and provides FMSS with the ability to revoke access for terminated, suspended, or separated employees with minimal delays.
-
-
Facilities equipped with EPACS must utilize this system as the primary method for gaining access. It is crucial to avoid using mechanical keys to bypass EPACS, as electronic access is employed, for example, to determine who is present within a facility during emergencies and to strengthen the Insider Threat Program.
-
FMSS Physical Security is responsible for managing master keys, IRS perimeter door keys, and unissued controlled/limited area keys.
-
BUs will manage their own office and storage keys, as well as combinations for door cipher locks, security containers, safes, and vaults. All new keys created for locks in a system will be cut to work with the facility master key.
-
BU managers should annually conduct an internal key inventory of all office keys within the BU by the end of each fiscal year. Assigned FMSS Physical Security staff are available to provide support, as necessary by the end of each fiscal year.
-
Use Form 1930-D, Key Custody Receipt, to issue all facility access and limited/controlled area door keys. Complete the Form 1930-D, obtain all required signatures, and the issuing authority (FMSS or BU Manager) will maintain this record until the issued key is returned.
-
Security area access door lock keys must be:
-
Labeled with an identifier unrelated to the room number.
-
Engraved with the words U.S. Government - DO NOT DUPLICATE.
-
Tracked in the Key Control Inventory.
-
-
Store limited/controlled area keys not in personal custody of an authorized IRS employee in a security container.
-
Keep security area key and combinations issuance to the absolute minimum. Issue keys and combinations only to those individuals, preferably supervisors, who require after-hours access to the area.
-
The SSC implements key control program policy requirements and guidelines by doing the following:
-
Designate a territory Key Control Officer (KCO).
-
Approve duplicate/additional keys for perimeter doors, limited/controlled area doors, and master key requests.
-
Review and certify the territory Key Control Registry (KCR) every fiscal year.
-
Assign a member of the Physical Security staff to identify key and lock requirements for territory space projects.
-
-
The FMSS KCO will:
-
Review and certify territory KCR every fiscal year, to confirm all perimeter, master, and limited/controlled area keys are listed on the KCR for each territory facility.
-
Manage mechanical metal keys issuance, return and destruction for facility perimeter, limited/controlled areas, and master keys.
-
Secure FMSS-managed unused locks and padlock cores for assigned facilities in an approved security container.
-
Inform FMSS SSC of significant key/lock concerns (multiple missing keys, unrecoverable master key, chronic malfunctioning locks, etc.).
-
Within 10 business days, initiate the process to have the relevant locks re-keyed (new core installed) if a BU Annual Key Inventory identifies more than a 5% loss of perimeter and/or limited/controlled area keys.
-
-
The assigned FMSS SSC or designee must approve duplicate/additional key requests for perimeter doors, and limited/controlled area doors.
-
FMSS Physical Security staff maintains all master keys (a key that can open all applicable IRS space with the exception of Criminal Investigations space) in a central location. Properly identify master keys to their corresponding doors. Exceptions may exist where the area is required to be ¡°off-master.¡±
-
BUs must limit key issuance to persons requiring access to an area, room, or container, and keep on-hand and issued keys to a minimum. A ¡°Master Key¡± is issued to a limited number of personnel selected by the facility¡¯s issuing authority. Master keys will not be issued to more than 5% of an office population except when there are a small number of IRS employees in a post of duty.
-
FMSS Physical Security staff maintains extra locks and padlock cores supplies. FMSS provides two keys for each container (lateral) and padlock (upright with bar lock) to maintain security container (lateral and upright) integrity. If the central core of a security container lock or padlock is replaced with a non-security lock core, or has more than two keys, it is not considered secured.
-
EPACS is the IRS equipment used to selectively authorize or restrict access to a facility/space in response to Homeland Security Presidential Directive-12 (HSPD-12). HSPD-12 requires all departments and agencies to use HSPD-12 credentials to gain access to federally controlled facilities. EPACS allows or prevents access of personnel to a building, a room, or security area quickly and effectively while minimizing risk.
-
EPACS is the technical solution for electronic physical access control in the IRS. Where feasible, access to IRS facilities or space will be managed by installing EPACS in accordance with applicable current standards.
-
The FMSS SSC will determine where EPACS is installed based on space configuration, type of existing hardware, type of partition walls, FSA results, and ISC Standards. Submit requests for policy deviations by email via FMSS AD Operations to FMSS AD, Security for review.
-
EPACS maintains records of access control system activity, user permissions, and facility configuration. Per Treasury Security Manual (TD P 15-71), ¡°Access control systems must provide auditable records of access.¡± EPACS can notify security staff of attempts to gain unauthorized access or to tamper with or bypass the access control equipment.
-
Commercial video doorbells may be utilized in IRS to remotely view visitors but may not be used to remotely unlock doors, as it violates Information Technology (IT) and visitor escort policy.
-
BU managers must use the automated HRConnect SEC Module to certify facility access door key return/recovery from separating employees.
-
BU managers must:
-
Complete PAR actions in HR Connect for separating employees.
-
Verify issued facility access door key(s) recovery from separating employees.
-
Report unrecovered facility access, limited/controlled area doors, and master keys to:
-
Situational Awareness Management Center (SAMC).
-
FMSS Physical Security staff.
-
-
FMSS Physical Security staff routinely accesses the HRConnect SEC module to:
-
The IRS has four types of mailrooms per IRM 1.22.5, Mail Operations:
-
Submission Processing/Campus Mailrooms: Staffed by IRS employees and provides services to multiple locations.
-
Contract Mailrooms: Staffed by contractor employees in field offices of more than 250 employees.
-
Shared Mailrooms: Found in smaller Posts of Duty (POD) with 20-250 employees. Staffing is a shared responsibility by building occupants.
-
POD Mailrooms: PODs with less than 20 employees generally do not have an enclosed mailroom, but a location in the POD where incoming mail is sorted for employees.
-
-
While the threat of attack through the mail is rated low by the ISC, the IRS remains vulnerable to chemical, biological, or radiological (CBR) dispersal, and explosive devices transmitted through mail or delivery services.
-
All designated mailrooms and mail opening areas must have safe/suspicious mail handling and incident reporting procedures posted for all mail opening employees and/or contractor employees to view.
-
Reporting an incident:
-
Call first responders for your respective office (local PSO, if present in the facility).
-
If PSO is not on site, immediately report to your manager and call 911.
-
Contact Federal Protective Service (FPS) at 1-877-4FPS-411.
-
Contact TIGTA at 1-800-589-3718.
-
Report to SAMC within 30 minutes of incident discovery or as soon as safely possible.
-
-
Incidents other than mail security may be reported per IRM 10.2.8, Incident Reporting, to SAMC through any of the following methods:
-
Website: https://tscc.enterprise.irs.gov/irc/
-
Telephone: 1-866-216-4809
-
E-mail: [email protected]
-
-
X-ray machines and/or metal detectors are leased from FPS and utilized to scan for suspicious or prohibited items in packages, mail, or carried on a person. PSOs assigned to IRS facilities are specifically trained and tasked to screen and identify suspicious objects.
-
For FSL III - V facilities:
-
X-ray machines and metal detectors must be used by PSOs to screen all visitors and all occupants and their property that do not possess an acceptable ID for access to IRS space.
-
PSOs must screen all mail and packages using x-ray machines. Further requirements regarding location of the x-ray machine are based on facility layout and FSL and detailed in ISC Risk Management Process for Federal Facilities, Appendix B: Countermeasures.
-
PSOs must physically inspect items that cannot be passed through screening equipment.
-
-
Due to the danger of explosives being shipped and detonated during mail handling, the ISC identifies security criterion based on the FSL of the facility. Refer to ISC Risk Management Process for Federal Facilities Appendix B: Countermeasures.
-
Drop boxes, or any container used for the purpose of collecting items such as payments, mail, or information without human-to-human interaction are strictly prohibited.
-
Facility Occupant Emergency Planning - The Occupant Emergency Plan (OEP) is the guide to ensure the IRS workforce is prepared and trained to respond to emergencies within each facility. Refer to IRM 10.2.9, Occupant Emergency Program, for more information.
-
Workplace Violence - FMSS authored Document 13402, Desk Guide for Workplace Violence Prevention and Response, to assist managers and employees. There are four categories of workplace violence:
-
Criminal Intent: The perpetrator has no legitimate relationship to the agency or its employees and is usually committing a separate crime, such as robbery, in conjunction with the violence.
-
Customer/Client: The perpetrator has a legitimate relationship with the agency and becomes violent while being served by the agency. This category includes customers, clients, and any other group for which the agency provides services.
-
Employee-on-Employee: The perpetrator is a current or former agency employee who attacks or threatens another current or former employee(s) in the workplace.
-
Personal Relationship: The perpetrator usually does not have a relationship with the agency but has a personal relationship with an agency employee, contractor, or customer.
-
-
Domestic Violence, Sexual Assault, and Stalking - Human Capital Office (HCO) has centralized support information on the Domestic Violence, Sexual Assault, and Stalking website.
-
Employee Protection - Privacy, Governmental Liaison, and Disclosure (PGLD) oversees two programs to identify taxpayers who represent a potential danger to employees: Caution Upon Contact (CAU) and Potentially Dangerous Taxpayer (PDT). IRS employees who have duties requiring taxpayer contact should be aware of both programs and can find information on the Office of Employee Protection website and Document 12963, A Guide to the Office of Employee Protection Programs.
-
Trash containers, mailboxes, donation/recycle containers, vending machines, and other similar objects must be positioned a minimum of 33 feet from building exterior and entry/exit points, or implement blast containment measures to mitigate an explosion, in accordance with ISC Standard, Appendix B.
-
ISC Standard, Appendix B Countermeasures references ¡°Heightened Security Alerts¡± and provides options relating to countermeasures based on the FSL. When localized risk increases, and upon notification of FPS, local law enforcement, or other federal agencies, SSCs must coordinate with FPS to review and implement the below, or other recommended countermeasures.
-
Vehicle Screening: Screen visitor vehicles before entry into the controlled parking area. Randomly screen employee and contractor vehicles during heightened security alerts. (FSL IV-V)
-
Vehicle Access Points: Reducing the number of vehicle access points, particularly under periods of heightened security alerts, reduces vulnerability and security costs associated with monitoring and controlling access to the site. (FSL III-V)
-
Receptacle & Container Placement: When containers are used, ensure that they can be removed during periods of heightened security alerts. (FSL I-V)
-
Occupant Screening: During a heightened security alert, the FSC or SSC (for single-tenant facilities) should consider screening all ¡°continuous¡± occupants. (FSL I-V)
-
Limited Building Entry Points and Convenience Doors: Reducing the number of building entry points, particularly under periods of heightened security alerts, reduces vulnerability and security costs associated with monitoring and controlling access. (FSL III-V)
-
-
The protection of assets requires the use of different security measures within facilities.
-
At least annually, each BU must determine what items and information require protection beyond that of being in secure IRS space and establish internal procedures and controls to safeguard required items. There are four types of protection for consideration:
-
Normal Security
-
Locked Containers
-
Security Containers
-
Security Areas
-
-
Normal Security is the IRS standard and is appropriate for the majority of protected items. IRS space is designated as a controlled area and all visitors and contractor employees must be escorted unless they have been granted staff-like access by HCO Personnel Security. Additionally, the IRS has adopted general clean desk and containment objectives for the protection of taxpayer, privacy act, and other protected data.
-
For some items, such as Sensitive but Unclassified (SBU), Controlled Unclassified Information (CUI), or personal identifiable information (PII), a standard locked container is sufficient.
-
Locked containers are any lockable metal container with riveted or welded seams. All key and combination locks must be controlled by the BU with oversight of the area with the same level of protection for the items being protected.
-
A security container will be used for storing items which BUs or applicable federal regulations determine require a higher level of security, IRS utilizes either GSA-approved Class 5 or 6 security containers. All security containers must be marked on the outside of the front face of the containers ¡°GSA Approved Security Container¡± and must be purchased through GSA Global Supply.
-
Class 5 security containers have several types:
-
Filing Cabinets (Two or Four Drawer)
-
Map and Plan Container
-
Information Processing Systems (IPS) Container
-
Weapons Containers
-
-
Class 6 security containers are specifically approved for storage of CNSI and must be equipped with a Federal Specification FF-L-2740B compliant combination lock.
-
Containers in need of repair must be serviced by a GSA certified technician to maintain the certification of the container.
-
All combinations must be controlled by the BU owning the security container.
-
The IRS has numerous areas which require additional protection due to the importance of their function or sensitivity of the information or assets. The degree of security and access control these areas require depends on the nature, sensitivity, and/or importance of the information and assets safeguarded. Examples include:
-
Large amounts of currency
-
Mail processing centers
-
Law enforcement investigative information
-
Backup information systems
-
-
The IRS utilizes two types of security areas to restrict access - Controlled and Limited Areas:
-
A Controlled Area requires a single-factor authentication mechanism. Each IRS space is considered a Controlled Area, which ensures only authorized personnel and visitors are allowed access. Additional controlled areas, which are considered ¡°above standard¡± may be established within IRS spaces for alarm panel rooms, security operations centers, rooms with large amounts of currency, or other similar areas within a BU.
-
A Limited Area is an area to which access is limited to authorized personnel only and requires two-factor authentication mechanism. All personnel who access a limited area must have a verified official business need to enter.
-
-
Managers may request their territory SSC to determine if additional levels of access control may be beneficial.
Note:
The IRS Computer Rooms (Martinsburg, Memphis, Kansas City, Fresno, Austin, and Ogden) are designated Limited Areas. Other IRS space that contains IT assets such as Intermediate Distribution Frame (IDF), Main Distribution Frame (MDF), or Combined Distribution Frame (CDF) are designated as Controlled Areas and may be safeguarded with single-authentication access control (e.g., EPACS (preferred method where feasible), mechanical, or cipher locks) at the discretion of the owning BU and concurrence of the Territory SSC or servicing Physical Security staff.
-
Each BU manages combinations for their door cipher locks, security containers, safes, and vaults.
-
Door cipher locks must be programmed to a minimum four-digit combination. Three-digit combinations are more susceptible to compromise than four-digit combinations.
-
In accordance with TD P 15-71, the combination lock must be changed under any of the following conditions:
-
When the safe or lock is first placed into service.
-
When a person knowing the combination no longer requires access to it and other controls do not exist to prevent their access to the lock.
-
When a combination has been subjected to possible compromise, actual compromise, or unauthorized disclosure.
-
At least every three years unless conditions dictate sooner.
-
-
Use IRS Service Central (IRWorks) to request all combination changes. Limit combination issuance to those with a need to access the area, room, or container. Maintain security container combinations by using Standard Form (SF) 700, Security Container Information (the form has three parts).
-
SF700 Instructions:
-
Complete Part I entirely.
-
Separate Part I and attach it to the inside container front control drawer (with the lock mechanism).
-
Record the combination on Part II.
-
Place Part II inside Part III and seal it.
-
-
Maintain safe and vault combination records (Parts II & III of SF700) centrally within the local BU management office.
-
Place all completed SF700 forms in a container with the same or higher security classification as the highest classified material stored in the container, or security area.
-
The IRS has adopted general clean desk and containment objectives for the protection of taxpayer, privacy act, and other protected data. There are certain areas, such as Submission Processing Centers, campuses, and computing centers, where the full implementation of clean desk and/or containerization procedures are not appropriate.
-
FMSS utilizes contractor support for the security functions of PSO, explosive detection, credentialing, and countermeasures maintenance and testing.
-
Any requests for changes or additional services must be initiated through the assigned Physical Security staff.
-
PSO services are provided for IRS facilities by the Department of Homeland Security (DHS)/FPS. DHS/FPS is solely responsible for the management and oversight.
-
Any incidents or concerns relating to the performance of PSOs must be reported through SAMC and assigned Physical Security staff.
-
Questions relating to guard services or request for changes will be submitted through IRS Service Central (IRWorks).
-
Explosive Detection Canine Teams (EDCT) provide support to IRS facilities based on identified risks. EDCT consists of a dog and handler and are utilized to inspect all incoming mail, packages, and other deliveries being made to IRS facilities prior to delivery and receipt by IRS personnel.
-
EDCTs also conduct roving patrols, random security inspections, and provide emergency response to security incidents. EDCTs may be utilized to support OEPs, Continuity of Operations, and law enforcement partners (e.g., CI, TIGTA, federal or local law enforcement), upon request.
-
All IRS employees and contractor employees have a responsibility to report suspicious activity and hazards which impact the security of facilities, personnel, and assets.
-
IRS facilities are protected with various security systems and equipment to deter and detect security breaches. To maintain an effective security posture, it¡¯s vital that security hazards are reported and monitored to resolution. Example of security hazards include but are not limited to:
-
Lighting outages impacting video surveillance or personal observation
-
Overgrown or downed trees, foliage, or other visual obstructions
-
Inoperable cameras, alarm activation points, duress alarms, and intrusion detection systems
-
Breaches (gaps, holes, etc.) in perimeter fencing
-
Malfunctioning door locks or other access control issues
-
-
Most security hazards are identified by FPS personnel and PSOs during security patrols but reports from IRS personnel are encouraged and not uncommon.
-
IRS personnel must report issues directly to PSOs, to assigned Physical Security staff, or open an IRS Service Central (IRWorks) case.
-
To report through IRWorks - Open the IRWorks website, select Workplace, then Physical Security, select the appropriate category, and follow the prompts to describe the issue.
-
-
Assigned Physical Security staff will:
-
Confirm with assigned FPS officer(s) that post orders for PSOs include the requirement that:
-
All identified security hazards are reported as soon as possible.
-
Security measures are implemented to mitigate risks until the security hazard is resolved.
-
Track all IRS Service Central (IRWorks) cases from submission to satisfactory resolution.
-
-
All suspicious activity or items must be reported immediately to assigned PSOs, Physical Security staff, or through a SAMC report submission. Examples of suspicious activity or items include but are not limited to:
-
Unattended boxes, packages, or bags in or near IRS or federal facilities
-
Unmanned aerial systems/drones near or over IRS facilities
-
Potential surveillance of IRS facilities or personnel
-
-
Photography within or on the grounds of IRS facilities and campuses is prohibited except when specifically authorized by the FMSS SSC.
-
Taking photographs of external features of a facility or other property which provides information not publicly accessible must be immediately reported to FMSS Physical Security staff, the Treasury Inspector General for Tax Administration (TIGTA), and FPS.
-
Photography is defined as any physical or electronically recorded image, including still photographs, x-ray images, video tapes or recordings, and motion pictures.
-
Signage will be posted within or on IRS Campuses, facilities, and leased space prohibiting the use of photography and video recordings.