| title | Security and Protection (Replication) | Microsoft Docs | ||||||
|---|---|---|---|---|---|---|---|
| ms.custom | |||||||
| ms.date | 03/14/2017 | ||||||
| ms.prod | sql-server-2016 | ||||||
| ms.reviewer | |||||||
| ms.suite | |||||||
| ms.technology |
|
||||||
| ms.tgt_pltfrm | |||||||
| ms.topic | article | ||||||
| helpviewer_keywords |
|
||||||
| ms.assetid | 310a8203-c0aa-4794-93fe-737d7c3fcfd6 | ||||||
| caps.latest.revision | 44 | ||||||
| author | BYHAM | ||||||
| ms.author | rickbyh | ||||||
| manager | jhubbard |
Help protect the replication scenarios that you deploy in [!INCLUDEmsCoName] [!INCLUDEssNoVersion] from malicious attacks and improve the security of your data.
Security Overview
Threat and Vulnerability Mitigation (Replication)
Identity and Access Control (Replication)
Secure Development
Replication Agent Security Model
Security Role Requirements for Replication
Replication Security Best Practices
Secure Deployment
Secure the Distributor
Securing Replication Over the Internet
Secure Operation
Manage Logins and Passwords in Replication