The AI integration layer your compliance team never anticipated
In the world of technology, rapid changes and advancements are part of the natural landscape. As iterations of digital tools and solutions enter the marketplace, there’s a massive amount of tension created as new ways of working eclipse the old. When AI broke the mold with the level of innovation unlocked, then came generative AI and other AI-enabled tools. The model context protocol (MCP) is one such transformative piece of technology.
MCP creates a universal standard for connecting AI assistants to external tools like databases, file systems, APIs, and enterprise applications.1 Access to these tools transforms AI assistants from isolated chatbots into productive agents. The protocol has seen explosive adoption because it solves a real problem: giving AI assistants secure, structured access to the context they need to be useful. When it works well, an MCP server eliminates hours of manual data gathering and lets knowledge workers focus on judgment rather than “busy work.” Powerful, right?
That power is precisely what makes MCP a governance challenge. Right now, anyone in the world can build an MCP server, meaning they can publish it to an open-source software repository like GitHub or npm in under two hours—with no third-party vetting, no certification, no accountability. Tomorrow, someone in your organization could download that server to their computer, connect it to their AI assistant, and grant it access to files, credentials, and sensitive corporate data. The barrier to entry on both sides is startlingly low. Publishing requires basic scripting skills, and installing often requires just a few clicks. Because MCP servers are so useful and so easy to deploy, they're prime candidates for shadow IT adoption. And the real kicker is that in most organizations, no one in security or compliance would know.
What is an MCP server and why does it pose a governance issue?
When executives hear “server,” they reasonably assume procurement processes and security reviews apply. So, what is an MCP server? MCP servers are lightweight code packages that run on local machines, not traditional infrastructure. They're downloaded from the same repositories that developers already access frequently. According to Stack Overflow's 2024 Developer Survey, 59% of professional developers use Docker and npm regularly. The 2025 survey shows Docker usage jumped to over 71%.2
This is what makes MCP's risk profile so unique. A malicious or poorly secured MCP server doesn't arrive through a procurement request or vendor contract. It arrives the same way any npm package does, through channels your developers use hundreds of times per day, channels that aren't usually locked down due to concerns of crippling productivity.
With the powerful possibilities of MCP comes new risks, and the scale of the open ecosystem compounds the challenge. Many MCP servers are rapidly developed with limited security review, increasing the risk of vulnerabilities.3 And yet, this has not hindered wide adoption. What does this mean? MCP adoption is moving faster than the governance frameworks designed to protect enterprise data.
The compliance gap of MCP servers
Since the discovery of a vulnerability in MCP’s fundamental mechanics, there’s increasing scrutiny on the use of MCPs. If this vulnerability were exploited, sensitive data could be exfiltrated through a form of indirect prompt injections known as tool poisoning attacks. These attacks occur when malicious instructions are embedded within MCP tool descriptions. Invisible to users but visible to AI models, these instructions could manipulate AI models into performing unauthorized actions without user awareness.4 These leave massive blind spots for compliance.
International Organization for Standardization (ISO) 27001 requires documented processes for managing supplier security risks; anonymous GitHub repositories don't meet that standard. For government contractors, the federal risk and authorization management program’s (FedRAMP) supply chain risk management requirements explicitly cover open-source components, and third-party assessors will scrutinize any MCP usage intensely.
The audit implications of MCP adoption are immediate. Under system and organization controls security framework (SOC 2), any MCP server accessing organizational data becomes part of your system boundary and must be documented.5 Auditors will evaluate these as subservice organizations, yet community-developed servers lack the certifications, security policies, and track records that compliance frameworks expect.
How technology leaders can navigate MCP server meaning
The answer isn't to ban MCP. This technology delivers genuine value, and prohibition only drives adoption underground. The answer is governed adoption, built on the same cyber hygiene principles that protect your other critical systems. After all, what is an MCP server if not another tool that requires the same oversight and security as any other application?
When determining how your organization will approach the utilization of MCP servers, here are four best practices to incorporate:
- Inventory and whitelist: Determine where MCP servers exist across your organization, including individual laptops. Then, establish a vetted server whitelist where only approved MCP servers are permitted to connect. This is your first line of defense. Even if someone installs a malicious server, endpoint whitelisting blocks any attempts to exfiltrate data to unverified third-party domains.
- Enforce least privilege and network segmentation: MCP servers should only access the specific systems and data they need, and nothing more. Implement network segmentation to isolate AI tooling from sensitive infrastructure. Use access control lists to limit what each server can reach. Input validation should be mandatory for any data flowing through MCP connections.
- Monitor, review, and assess continuously: Treat MCP servers like any privileged code in your environment. Implement logging and monitoring for all MCP activities, conduct code reviews before approving new servers, and include MCP infrastructure in your regular security assessments. The ecosystem is evolving rapidly, and your controls should too.
- Engage auditors proactively: Don't wait for your SOC 2 or ISO audit to surface MCP server meaning as an issue. Frame the conversation around your governance controls—whitelisting, segmentation, and monitoring—not around whether the technology exists in your environment.
These governance controls may face pushback, particularly around developer productivity. Teams accustomed to instant npm access will argue that approval workflows slow them down. Teams also face competitive pressure to ship AI features quickly, and organizations managing multiple compliance frameworks may resist additional governance overhead. This is predictable and manageable.
Embrace the next iteration of AI-enabled tech
MCP has already created a tremendous ripple effect across industries and organizations. While it comes with risks, it can’t be emphasized enough that banning technology like this will only create more compliance issues later.
The most obvious parallel was cloud adoption a decade ago. Organizations that attempted blanket bans created shadow IT problems worse than the risks they sought to avoid. Those that established governance frameworks early on captured productivity benefits with acceptable risk profiles.
MCP requires the same clarity. This technology delivers real value, the ecosystem is genuinely risky today, and the only sustainable path forward is governance that enables rather than prohibits. What is an MCP server and how will your people use it? That's a question of whether to govern it proactively or reactively explain it to auditors after a breach.
To learn more about how CAI helps organizations with AI governance and cyber controls, fill out the form below.
Endnotes
- “Introducing the Model Context Protocol.” Anthropic. November 25, 2024. https://www.anthropic.com/news/model-context-protocol. ↩
- Christopher Kosman. "Highlights from the Stack Overflow Developer Survey 2025 (vs 2024)." 1000.software Substack. August 11, 2025. https://1000software.substack.com/p/highlights-from-the-stack-overflow/. ↩
- David Weston. “Securing the Model Context Protocol: Building a safer agentic future on Windows.” Microsoft. May 19, 2025. https://blogs.windows.com/windowsexperience/2025/05/19/securing-the-model-context-protocol-building-a-safer-agentic-future-on-windows/. ↩
- Luca Beurer-Kellner, Marc Fischer. “MCP Security Notification: Tool Poisoning Attacks.” Invariant Labs, a Snyk Company. April 1, 2025. https://invariantlabs.ai/blog/mcp-security-notification-tool-poisoning-attacks. ↩
- “What is SOC 2?” Secureframe. https://secureframe.com/hub/soc-2/what-is-soc-2. ↩