Discuss how cache handling should be accomplished in order to minimize the ability of the attacker to deliver a payload through the cache?

Discuss how cache handling should be accomplished in order to minimize the ability of the attacker to deliver a payload through the cache?