PR.DS-10:
The confidentiality, integrity, and availability of data-in-use are protected
Implementation Examples
Ex1:
Remove data that must remain confidential (e.g., from processors and memory) as soon as it is no longer needed
Ex2:
Protect data in use from access by other users and processes of the same platform