SOC 2: Confidentiality
Controls for protecting confidential information through classification, access restrictions, and secure handling.
Back to SOC 2 categoriesControls and Detailed Requirements
C1.1Data Classification and Handling Rules
Classify confidential data types and define handling requirements for storage, transfer, and disposal so teams apply consistent safeguards throughout the data lifecycle.
C1.2Confidential Access Restrictions
Restrict access to confidential data by role and business need, enforce strong authentication, and maintain audit trails for data access events.
C1.3Encryption and Key Management
Use encryption for confidential data in transit and at rest, and manage encryption keys securely with controlled access, rotation, and backup procedures.
C1.4Secure Data Transmission
Protect confidential information during transmission through approved secure protocols, endpoint validation, and controls that prevent unapproved data egress.
C1.5Confidential Data Retention and Disposal
Apply documented retention schedules and secure disposal methods to minimize unnecessary data exposure and satisfy contractual or regulatory obligations.
C1.6Confidentiality Incident Response
Define and execute response procedures for suspected or confirmed unauthorized disclosure of confidential information, including containment and notification actions.
C1.7Third-Party Confidentiality Safeguards
Require contractual and operational confidentiality safeguards for vendors and partners that process confidential data, including ongoing assurance and review.