Shared Resource Leakage

Prevent unauthorized and unintended information transfer via shared system resources. Ensure that processes reusing a shared system resource (e.g., registers, main memory, secondary storage) do not have access to information (including encrypted representations of information) previously stored in that resource during a prior use by a process after formal release of that resource back to the system or reuse

ID: CM0040
Tier: I
Ground CM 
Created: 2022/10/19
Last Modified: 2023/11/29