Information Transfer
Plain English Translation
ISO 27001 Annex A.5.14 establishes the rules for moving data safely from one place to another, whether internally between employees or externally to third parties. It requires organizations to define acceptable transfer methods (like secure email or encrypted file sharing) and put legal agreements in place (like NDAs) before sharing sensitive information. The goal is to prevent data leaks, interception, or misdirection during the transmission process, covering electronic, physical, and even verbal transfers.
Technical Implementation
Use the tabs below to select your organization size.
Required Actions (startup)
- Enforce TLS/SSL for all web traffic and use reputable cloud storage for sharing
- Require NDAs for all vendors and contractors
Required Actions (scaleup)
- Implement secure file transfer solutions (e.g., password-protected links with expiry)
- Formalize Data Processing Agreements (DPAs) for all sub-processors
Required Actions (enterprise)
- Deploy Data Loss Prevention (DLP) to block unauthorized transfers of PII/credentials
- Automate encryption key exchange and manage dedicated private connectivity (VPN/Interconnects) for partners
It is an organizational control requiring rules, procedures, and agreements to protect information during transfer, covering electronic, physical, and verbal exchanges within the organization and with external parties.
A.5.14 consolidates the previous controls A.13.2.1 (Policies and procedures), A.13.2.2 (Agreements), A.13.2.3 (Electronic messaging), and A.13.2.4 (Confidentiality) into a single, comprehensive control focused on information transfer.
It should include approved transfer methods (e.g., secure email, SFTP), prohibited methods (e.g., personal cloud storage), encryption requirements, retention rules, and guidelines for handling verbal or physical transfers.
By executing formal transfer agreements (like NDAs or DPAs) that define liability and security standards, and by using technical controls like encrypted channels and identity verification before sending data. WatchDog Security's Vendor Risk Management can help track required agreements and assessment status per vendor so teams can verify prerequisites before sharing.
Not necessarily all, but encryption is typically required for transfers over public networks or for sensitive information (Confidential/Restricted) based on the organization's risk assessment and classification scheme.
It requires configuring these platforms to restrict access permissions, logging external sharing activities, and enforcing policies (like blocking anonymous links) to ensure transfers remain secure and authorized.
Auditors look for a Data Management or Transfer Policy, signed NDAs/agreements with partners, logs of file transfers (e.g., SFTP logs), and configuration evidence of encryption (TLS/SSL) for communication channels.
Policies should instruct staff not to discuss sensitive information in public areas (e.g., cafes, trains) or over insecure lines, and to verify the identity of the person they are speaking with.
Common issues include lack of signed data transfer agreements with vendors, use of unapproved 'Shadow IT' tools for file sharing, and sending sensitive data (like passwords or PII) via cleartext email.
It directly supports GDPR compliance (especially Chapter V) by mandating agreements and security measures for cross-border transfers, aligning with requirements for Standard Contractual Clauses (SCCs) and secure processing.
Email attachments and open links are common causes of accidental disclosure because access can be forwarded, retained indefinitely, or sent to the wrong recipient. WatchDog Security's Secure File Sharing helps by enabling encrypted sharing with access controls like TOTP verification and audit logs, so sensitive transfers can be time-bounded, attributable, and aligned to the organization's transfer rules.
A.5.14 fails when teams move fast and share data before legal and security checks are complete, creating unmanaged risk and weak audit evidence. WatchDog Security's Vendor Risk Management helps by maintaining a vendor catalog with assessment status and required documents, making it easier to verify that NDAs/DPAs and minimum security requirements are completed before data exchange.
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-17 | WatchDog Security GRC Team | Initial publication |