Considering replica database capacity and security
The usage pattern of replica database servers in a system is usually fairly traditional. The servers are accessed by applications that perform queries and write operations to the database. The capacity of the replica databases should be sufficient to serve the normal online usage of the server. Reserve some additional capacity to cover the overhead caused by database synchronization.
If possible, deny user access to the physical database file to ensure the maximum level of data security in the system.