Information is often most vulnerable when it is moving.
Annex A 5.14 exists to ensure that information is protected during transfer, whether it is sent electronically, shared verbally, or moved using physical media. This control focuses on reducing the risk of unauthorised access, interception, alteration, or loss while information is in transit.
The emphasis is on appropriate protection based on classification and risk, not blanket restrictions that hinder normal business activity.

Annex A 5.14 of ISO 27001:2022 addresses the security of information transfer.
At a practical level, this means:
The control does not mandate specific technologies or methods. It expects organisations to apply proportionate controls that reflect how information is actually shared.
Information transfer is a routine business activity.
Examples include:
Each of these introduces risk if not managed deliberately.
Annex A 5.14 ensures organisations recognise that data in transit requires protection, just as data at rest does. Many incidents occur not because systems are insecure, but because information is transferred in ways that bypass controls.
A pragmatic approach to Annex A 5.14 typically includes the following elements.
The level of protection applied during transfer should reflect the information’s classification.
Higher sensitivity information typically warrants:
This keeps protection proportionate and credible.
Annex A 5.14 recognises three broad transfer types:
Each carries different risks and benefits from tailored guidance rather than a single generic rule.
For electronic transfer, organisations often consider:
The focus is on reducing common, avoidable errors.
When information is transferred physically, considerations often include:
Physical transfer risks are often overlooked but remain relevant.
Verbal transfer can expose sensitive information unintentionally.
Organisations often provide guidance on:
Awareness is the primary control here.
Where information is shared externally, organisations may define:
Clarity reduces uncertainty and dispute.
Information transfer controls work best when they reflect real behaviour.
Annex A 5.14 is about protecting information beyond system boundaries.
When information transfer is managed effectively:
Information rarely stays in one place. Treating transfer as a deliberate security activity helps ensure protection travels with it.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today