Selective Object Synchronization
Explore how RMF protects you from specific SQL attack vectors
Summary
When deployed in Federated or Independent architectures, RMF offers an alternative to traditional SQL replication with object-level synchronization for Milestone XProtect deployments. By pushing each object (e.g., camera, view, role) through Milestone’s native APIs, RMF enables selective, API-validated replication with built-in safeguards that minimize the spread of cyber threats.
The cyber-risk in 'copy-everything' replication
Traditional replication engines, such as SQL Failover, SQL Server Always On Availability Groups, Microsoft Failover Cluster with shared SAN storage, VMware vSphere HA/vMotion, Milestone Management Server Fa on shared datastores and SQL Server Log Shipping, were designed for continuity at any cost: they stream every byte, healthy or hostile, from a primary database to its standby in near real-time. This blind fidelity works wonders for availability, but it also guarantees that a single corrupt row, ransomware-encrypted page, or rogue admin account is instantly mirrored across your entire estate. In today’s threat environment, that “always identical” philosophy is less a safeguard than a high-speed propagation channel for attacks.

Cybersecure Object Synchronization
RMF’s object-level synchronization inverts that risk profile by making every change pass through Milestone's API, one self-contained object at a time. Because each user, policy, or device is treated as a discrete payload, the sync engine can validate, log, transform, or outright block it before it ever crosses network boundaries.
This fine-grained pipeline operates over a single HTTPS port with narrowly scoped tokens—no open database endpoints, no sysadmin logins—eliminating the lateral-movement footholds that classic replication leaves exposed. In practice, you keep the business intent (“copy the new camera,” “add this schedule”) while stripping away the accidental or malicious noise that turns replicas into unwitting accomplices.

Explore subsequent pages to see how the RMF approach helps keep cybersecurity at the center of redundancy.
Last updated