Cross-Sector

SOC 2: Confidentiality

Controls for protecting confidential information through classification, access restrictions, and secure handling.

Back to SOC 2 categories

Controls and Detailed Requirements

7 of 7 controls
C1.1Data Classification and Handling Rules

Classify confidential data types and define handling requirements for storage, transfer, and disposal so teams apply consistent safeguards throughout the data lifecycle.

C1.2Confidential Access Restrictions

Restrict access to confidential data by role and business need, enforce strong authentication, and maintain audit trails for data access events.

C1.3Encryption and Key Management

Use encryption for confidential data in transit and at rest, and manage encryption keys securely with controlled access, rotation, and backup procedures.

C1.4Secure Data Transmission

Protect confidential information during transmission through approved secure protocols, endpoint validation, and controls that prevent unapproved data egress.

C1.5Confidential Data Retention and Disposal

Apply documented retention schedules and secure disposal methods to minimize unnecessary data exposure and satisfy contractual or regulatory obligations.

C1.6Confidentiality Incident Response

Define and execute response procedures for suspected or confirmed unauthorized disclosure of confidential information, including containment and notification actions.

C1.7Third-Party Confidentiality Safeguards

Require contractual and operational confidentiality safeguards for vendors and partners that process confidential data, including ongoing assurance and review.