WikiFrameworksSOC 2Restrict and Protect Transmission and Movement of Information

Restrict and Protect Transmission and Movement of Information

Updated: 2026-02-22

Plain English Translation

SOC 2 CC.7 requires organizations to restrict the transmission, movement, and removal of information strictly to authorized users and processes. This means implementing safeguards like encryption, secure communication channels, and data loss prevention to protect data in transit SOC 2 environments. By enforcing these IT security controls for data transmission movement, organizations can prevent unauthorized access, interception, and data leakage when information moves across networks, is transferred to removable media, or is accessed via mobile devices.

Executive Takeaway

Securing data in transit through encryption and movement restrictions is essential to prevent unauthorized interception and data loss.

ImpactHigh
ComplexityMedium

Why This Matters

  • Protects sensitive information from being intercepted or compromised while traveling across internal networks or the public internet.
  • Reduces the risk of data exfiltration by restricting the unauthorized transmission, movement, and removal of information.

What “Good” Looks Like

  • Implementing strong encryption technologies like TLS, secure VPNs, or SFTP for all data in transit to secure communication channels.
  • Deploying data loss prevention (DLP) tools, such as WatchDog Security's Posture Management, and mobile device management (MDM) to control how data is moved or removed.

SOC 2 CC.7 requires organizations to restrict and protect the transmission, movement, and removal of information. It matters because it prevents unauthorized interception, modification, or loss of sensitive data while it is actively moving across networks or being transferred.

To restrict information movement SOC 2 compliance dictates the use of data loss prevention (DLP) technologies, strict access controls, and policies that limit data transfers strictly to authorized internal and external users and processes.

Examples of controls for SOC CC.7 include enforcing TLS encryption for web traffic, utilizing secure VPNs, managing mobile devices with MDM software, and applying strict encryption standards to removable media.

It protects data in transit by mandating the use of encryption technologies or secure communication channels, ensuring that even if data is intercepted beyond connectivity access points, it remains unreadable to unauthorized parties.

The difference between data at rest and in transit SOC controls is that data at rest refers to information stored statically on disks or databases, while data in transit involves information actively moving across networks, which SOC 2 CC.7 explicitly protects.

Yes, to encrypt data in transit for SOC 2 compliance is a fundamental expectation. The SOC 2 Trust Services Criteria CC.7 explicitly calls for using encryption technologies or secure communication channels to protect data during transmission.

Auditors provide SOC audit guidance for CC.7 control by reviewing encryption policies, data flow diagrams, VPN configurations, and TLS screenshots to verify the organization applies effective IT security controls for data transmission movement.

SOC 2 data movement protection best practices include using SFTP for file transfers, implementing MDM for laptops and smartphones, deploying DLP solutions to restrict the ability to perform transmission, and forbidding unencrypted removable media.

Yes, mobile devices can comply if processes are in place to protect them as information assets. This typically involves using mobile device management (MDM) software to enforce encryption, secure transmission channels, and remote wipe capabilities.

Organizations document how to implement SOC 2 CC.7 controls by maintaining an updated encryption policy, retaining logs of secure data transfers, providing TLS/SSL configuration screenshots, and diagramming secure encrypted data flows.

WatchDog Security's Compliance Center helps automate the collection of evidence required for SOC 2 CC6.7 compliance by providing templates for encryption policies, monitoring data transmission, and flagging gaps in your existing data protection controls. The platform helps ensure your organization maintains encryption protocols and data loss prevention (DLP) settings, centralizing evidence for SOC audits.

WatchDog Security's Posture Management helps identify misconfigurations in network security settings and ensures that encryption standards, such as TLS for web traffic, are in place to protect data in transit. It provides actionable remediation steps to help organizations comply with SOC 2 CC6.7.

WatchDog Security's Compliance Center helps automate the collection of evidence required for SOC 2 CC6.7 compliance by providing templates for encryption policies, monitoring data transmission, and flagging gaps in your existing data protection controls. The platform helps ensure your organization maintains encryption protocols and data loss prevention (DLP) settings, centralizing evidence for SOC audits.

WatchDog Security's Posture Management helps identify misconfigurations in network security settings and ensures that encryption standards, such as TLS for web traffic, are in place to protect data in transit. It provides actionable remediation steps to help organizations comply with SOC 2 CC6.7.

WatchDog Security's Compliance Center helps automate the collection of evidence required for SOC 2 CC6.7 compliance by providing templates for encryption policies, monitoring data transmission, and flagging gaps in your existing data protection controls. The platform helps ensure your organization maintains encryption protocols and data loss prevention (DLP) settings, centralizing evidence for SOC audits.

WatchDog Security's Posture Management helps identify misconfigurations in network security settings and ensures that encryption standards, such as TLS for web traffic, are in place to protect data in transit. It provides actionable remediation steps to help organizations comply with SOC 2 CC6.7.

WatchDog Security's Compliance Center helps automate the collection of evidence required for SOC 2 CC6.7 compliance by providing templates for encryption policies, monitoring data transmission, and flagging gaps in your existing data protection controls. The platform helps ensure your organization maintains encryption protocols and data loss prevention (DLP) settings, centralizing evidence for SOC audits.

WatchDog Security's Posture Management helps identify misconfigurations in network security settings and ensures that encryption standards, such as TLS for web traffic, are in place to protect data in transit. It provides actionable remediation steps to help organizations comply with SOC 2 CC6.7.

WatchDog Security's Compliance Center helps automate the collection of evidence required for SOC 2 CC6.7 compliance by providing templates for encryption policies, monitoring data transmission, and flagging gaps in your existing data protection controls. The platform helps ensure your organization maintains encryption protocols and data loss prevention (DLP) settings, centralizing evidence for SOC audits.

WatchDog Security's Posture Management helps identify misconfigurations in network security settings and ensures that encryption standards, such as TLS for web traffic, are in place to protect data in transit. It provides actionable remediation steps to help organizations comply with SOC 2 CC6.7.

SOC2 CC6.7

"The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives."

VersionDateAuthorDescription
1.0.02026-02-22WatchDog Security GRC TeamInitial publication