How cache handling be accomplished in order to minimize the ability of the attacker

How should cache handling be accomplished in order to minimize the ability of the attacker to deliver a payload through the cache?

Sample Solution