It is shocking how easily sensitive information can be exposed, as you probably are aware.
Sensitive information is not limited 2 personally identifiable information such as identification numbers, home addresses, emails and phone numbers. It can also include system information such as configuration and internals of the system, which could leak through a stack trace in an exception for example.
Guideline 2-2
3. Consider purging highly sensitive information from memory after use.
Important Points:
You want to narrow the window when highly sensitive information may appear in core dumps, debugging and confidentiality attacks.
a. It may be appropriate to zero memory containing the data immediately after use rather than waiting for the garbage collection mechanism.