Sensitive information may leak as a result of a debug or power state transition when information access restrictions change as a result of the transition.