Data
176. Restrict system objects300. Mask sensitive data177. Avoid caching and temporary files301. Notify configuration changes178. Use digital signatures305. Prioritize token usage180. Use mock data321. Avoid deserializing untrusted data181. Transmit data using secure protocols329. Keep client-side storage without sensitive data183. Delete sensitive data securely365. Avoid exposing technical information184. Obfuscate application data375. Remove sensitive data from client-side applications185. Encrypt sensitive information383. Sandboxing to limit model exposure to unverified data sources