This document discusses securing MySQL replication deployments. It outlines several solutions to enforce data protection rules on a slave database in a replication setup. The solutions discussed include: 1) replicating over secure channels using the latest TLS version, 2) encrypting binary and relay logs at rest, 3) only allowing row-based events in the replication stream, 4) normalizing primary key requirements, and 5) running the slave applier thread with privilege checks. The goal is to allow the slave to impose rules on the replicated data from multiple masters to ensure sensitive data and changes are handled securely.