You can put all the users you want to restrict to SFTP into one group and then configure /etc/ssh/sshd_config to limit them to SFTP only, chrooted or not.
Code:
Subsystem sftp internal-sftp
Match Group sftp-only
AllowTCPForwarding no
X11Forwarding no
ForceCommand internal-sftp
That will allow them SFTP and nothing else. If you need to limit them to just a particular set of directories that is easily done with ChrootDirectory, already mentioned in another post.
Code:
Subsystem sftp internal-sftp
Match Group sftp-only
AllowTCPForwarding no
X11Forwarding no
ChrootDirectory /var/data
ForceCommand internal-sftp
With ChrootDirectory there is one condition that must be met: The directory and all directories above it, on up to root, must be root-owned and not writable by any other user or group. That makes chrooting to home directories harder but still possible.