Cache handling be accomplished in order to minimize the ability of the attacker

How should cache handling be accomplished in order to minimize the ability of the attacker to deliver a payload through the cache?