This control requires organizations to ensure that shared system resources (such as memory, temporary files, and print queues) cannot be used to accidentally or maliciously transfer information between users or systems that shouldn’t have access to each other’s data.
Read the full blog breakdown of 3.13.4