The Burn Bag Principle
Artifact control, staging data, and leaving nothing useful behind.
The operation ended, but the workstation told a longer story—recent files, resolver caches, and cloud sync logs. None of it was malicious. All of it was revealing.
Checklist
- Stage to a clean location; move once; verify integrity; then shred the staging area.
- Flush resolver caches, recent docs, MRU lists, and application logs where safe to do so.
- Rotate credentials and revoke tokens for short‑lived compartments.