PR.DS-10.232
Does your organization have procedures to securely remove confidential data from processors and memory when it is no longer needed?
Explanation
This question assesses whether your organization implements proper data lifecycle management for sensitive information in active memory. Confidential data that remains in memory after it's no longer needed creates unnecessary security risks, as it could be exposed through memory scraping attacks, system crashes that generate memory dumps, or other memory-based vulnerabilities. Examples include clearing encryption keys after use, wiping authentication tokens after sessions end, or nullifying sensitive customer data after a transaction completes. Evidence could include documented procedures for secure memory management, code review guidelines that address memory clearing, technical specifications showing implementation of secure memory handling functions (e.g., use of SecureString in .NET, explicit memory zeroing in C/C++), or automated testing that verifies memory is properly cleared after sensitive operations.
Implementation Example
Remove data that must remain confidential (e.g., from processors and memory) as soon as it is no longer needed
ID: PR.DS-10.232
Context
- Function
- PR: PROTECT
- Category
- PR.DS: Data Security
- Sub-Category
- The confidentiality, integrity, and availability of data-in-use are protected

