PR.DS-10:

The confidentiality, integrity, and availability of data-in-use are protected

Implementation Examples

Ex1:

Remove data that must remain confidential (e.g., from processors and memory) as soon as it is no longer needed

Ex2:

Protect data in use from access by other users and processes of the same platform