Fundamentally, how to help secure your replication environment is a matter of understanding the authentication and authorization options, understanding appropriate uses of replication filtering features, and learning specific measures for how to help secure each piece of the replication environment. The replication environment includes the Distributor, Publisher, Subscribers, and the snapshot folder. This chapter addresses replication security, but replication security is built on SQL Server security and Windows security. Therefore, you should understand this foundation and the specifics of replication security. For more information about security, see Security Considerations for a SQL Server Installation. For more information about security considerations for Oracle publishing, see the section "Replication Security Model" in the topic Design Considerations and Limitations for Oracle Publishers.
In This Section
Threat and Vulnerability Mitigation (Replication)
Discusses potential threats to a replication topology and describes ways to reduce those threats.
Identity and Access Control (Replication)
Describes how to use authentication, authorization, and filtering to help secure a replication topology.
Secure Development (Replication)
Describes replication security behavior, replication security best practices, and least permissions for replication.
Secure Deployment (Replication)
Describes how to better secure all components of a replication topology