{"id":5775,"date":"2025-11-13T07:00:00","date_gmt":"2025-11-13T07:00:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=5775"},"modified":"2025-11-13T07:00:00","modified_gmt":"2025-11-13T07:00:00","slug":"what-cisos-need-to-know-about-new-tools-for-securing-mcp-servers","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=5775","title":{"rendered":"What CISOs need to know about new tools for securing MCP servers"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Model Context Protocol allows AI agents to connect to data sources but the first iteration of this standard <a href=\"https:\/\/www.csoonline.com\/article\/4015222\/mcp-uses-and-risks.html\">lacked serious security<\/a>. Over the past few months, a multitude of vendors appeared to help solve the problem. Is the technology now ready for prime-time, or is it still too early to put into production?<\/p>\n<p>Some progress has been made on the core protocol side. In March, support was added for OAuth authentication, and in June, the protocol added support for third-party authentication servers such as Auth0, Okta, or a company\u2019s own identity management system.<\/p>\n<p>The MCP standards body also launched an official <a href=\"https:\/\/modelcontextprotocol.info\/tools\/registry\/\">MCP registry<\/a> in September, in order to address the problem of malicious MCP servers masquerading as legitimate ones.<\/p>\n<p>But significant security gaps remain. For example, authentication is optional, and the systems are vulnerable to prompt injections, tool poisoning, token theft, cross-server attacks, message tampering and more.<\/p>\n<p>Companies looking to get ahead of the competition when it comes to building agentic AI systems have to do a lot of security heavy lifting to keep these tools from exposing all their corporate secrets and sensitive data.<\/p>\n<p>And, over the past few months, vendors have been stepping up. Today, the major AI platforms have added security infrastructure, as have core technology providers, existing cybersecurity vendors, and a fleet of emerging players.<\/p>\n<h2 class=\"wp-block-heading\">Challenges of different uses of MCP servers<\/h2>\n<p>There are three main types of MCP server deployments, and each one has their own security challenges.<\/p>\n<p>When a company sets up an internal MCP server, on infrastructure they control, to access internal data or tools, to be used by AI agents that they also control. First, a low-risk use of this might be to allow employees to use AI agents to search through non-sensitive documents or databases, such as product descriptions. A higher-risk use case might be to allow access to customer data.<\/p>\n<p>Second, a company might allow their AI agents to access external data sources or tools via MCP servers. Here, one concern might be that the information the AI agents get back might include malicious instructions because either the server or the data source is compromised by an attacker.<\/p>\n<p>The third deployment type is that of an internal MCP server exposing a company\u2019s data or tools to the outside world. Again, this could be a low-risk use case if the MCP server provides access to product descriptions or user manuals. But it could also be extremely risky if MCP servers that allow external partners to connect in and place orders, submit invoices, and change their payment addresses.<\/p>\n<p>There are ways to ease into MCP deployments, says Anh Hatzopoulos, co-founder and CEO at PepperMill, a no-code AI platform. For example, an MCP server that goes and gets public LinkedIn information is going to be safer than one that handles financial transactions, she says. \u201cWith moving money, I\u2019m surprised that people are going hard at it right now, given the security problems with MCPs. But someone has to do it \u2014 and someone will discover those security problems.\u201d<\/p>\n<p>In fact, for many tech companies, especially SaaS vendors, MCP servers are already a must-have. \u201cThey can\u2019t wait,\u201d says Peter Nebel, chief strategy officer at cloud consultancy AllCloud. \u201cIf they wait, their competition will be there before them and have the MCP advantage.\u201d<\/p>\n<p>Companies that have already released official MCP servers for public use include PayPal, Notion, HubSpot, CloudFlare, Atlassian, Slack, and GitHub. There are also third-party providers building MCP servers. Zapier, for example, currently offers MCP connections to 8,000 different apps.<\/p>\n<p>If a vendor doesn\u2019t offer their own, official MCP server, someone else might set up unofficial ones that use the vendor\u2019s APIs. For example, there are already MCP servers out there for LinkedIn, Spotify, eBay, YouTube, AWS, Zillow, and many other platforms, some more trustworthy than others. Developers and power users are downloading them and using them to give their AI agents access to those platforms, but it\u2019s not always obvious where some of these less-than-official MCP servers are coming from, who\u2019s maintaining them, and what else they do under the covers.<\/p>\n<p>Pulse MCP <a href=\"https:\/\/www.pulsemcp.com\/servers\">lists<\/a> over 6,000 servers. MCP marketplace MCP.so currently <a href=\"https:\/\/mcp.so\/\">lists<\/a> more than 16,000. And a GitHub search for \u201cMCP server\u201d produces more than 45,000 results.<\/p>\n<h2 class=\"wp-block-heading\">What to look for in an MCP security platform<\/h2>\n<p>Whether a company connects their own agents to third-party MCP servers, their own MCP servers to third-party agents, or their own servers to their own agents, there\u2019s going to be the potential for data leakage, prompt injections and other security threats.<\/p>\n<p>That means companies will need to check for authorizations and permissions, implement fine-grained access controls, and log everything, says AllCloud\u2019s Nevel.<\/p>\n<p>Here are some other MCP security tools that vendors are offering today:<\/p>\n<p><strong>MCP server detection<\/strong>: It\u2019s easy for company employees to download and run their own MCP servers. These servers could boost their productivity or they could be a new attack vector. Some MCP security vendors are offering scanning services to help companies find all instances of shadow MCP servers in their environments.<\/p>\n<p><strong>Runtime protection<\/strong>: AI agents communicate with MCP servers in plain English. That creates the potential for prompt injections, data leaks and other security issues. Many MCP security vendors offer tools to monitor all communications for these and similar problems.<\/p>\n<p><strong>Authentication and access controls<\/strong>: The core MCP protocol now supports OAuth, but that\u2019s just the start. For additional security, vendors offer zero trust and least privilege control frameworks.<\/p>\n<p><strong>Logging and observability<\/strong>: Vendors can provide platforms to collect MCP logs, alert security teams about security events or policy violations, collect compliance data, or feed logs into existing security infrastructure.<\/p>\n<h2 class=\"wp-block-heading\">Vedors offering MCP security tools<\/h2>\n<p>Below, we divide in three sections the list of vendors offering MCP security tools.<\/p>\n<h3 class=\"wp-block-heading\">Hyperscalers<\/h3>\n<p>For companies all-in on a particular cloud platform, going with the MCP tools provided by that particular hyperscaler can be an easy way to get started.<\/p>\n<p>AWS launched its own agentic AI platform in July. Amazon Bedrock AgentCore includes a gateway that supports multiple protocols, including MCP, an identity management system and observability. In October, AWS followed this up with a set of guidelines for securing MCP servers with <a href=\"https:\/\/builder.aws.com\/content\/33oERPjcEutnPmaud1BvlPRP9zR\/security-guidelines-for-model-context-protocol-in-aws\">zero trust<\/a> best practices.<\/p>\n<p>Microsoft announced a basic Azure MCP server in April, added support for the Azure Key Vault in May, announced MCP support in the Azure AI Foundry Agent Service in June, and announced Azure API Management support in August. Azure API Management means that MCP servers can have secure and governed access to resources, with observability and control.<\/p>\n<p>In October, Microsoft announced the Microsoft Agent Framework, which includes support for both MCP and the Agent2Agent protocol, protection against prompt injection, PII detection, and multi-agent observability to ensure that the systems are doing what they\u2019re supposed to be doing.<\/p>\n<p>Google Cloud announced its MCP Toolbox for Databases in April with authentication and observability built in. In September, it released a reference architecture for securing MCP servers on the Google Cloud Platform, based around a centralized MCP proxy architecture. It uses the Google Identity Platform to validate identities and issue OAuth tokens, uses Model Armor to check messages for prompt injections, jailbreaks, or sensitive data, and a Secret Manager to store API keys, credentials, and sensitive configuration values. Its Artifact Registry can store MCP server images and scan them for vulnerabilities before they are deployed.<\/p>\n<p>Google also recommends using network-level security controls to isolate MCP servers and reduce the risk of lateral movement. Finally, Google\u2019s Security Command Center can identify unauthorized access and data exfiltration attempts.<\/p>\n<h3 class=\"wp-block-heading\">Major technology providers<\/h3>\n<p>Cloudflare: Cloudflare announced <a href=\"https:\/\/blog.cloudflare.com\/zero-trust-mcp-server-portals\/\">MCP Server Portals<\/a>, which enable enterprises to centralize, secure, and observe every MCP connection. This feature is part of Cloudflare One, the company\u2019s secure access service edge (SASE) platform.<\/p>\n<p>Palo Alto Networks: The company launched the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2025\/06\/securing-ai-agent-innovation-prisma-airs-mcp-server\/\">Prisma AIRS MCP Server<\/a> in June. It sits between the AI agent and the MCP server and detects malicious content in data, helping protect against prompt injection attacks, as well as web and DNS attacks. Another tool, MCP Security in Cortex Cloud WAAS, sits at the network boundary, and inspects MCP communications for malicious activity.<\/p>\n<p>SentinelOne: <a href=\"https:\/\/www.sentinelone.com\/blog\/avoiding-mcp-mania-how-to-secure-the-next-frontier-of-ai\/\">SentinelOne Singularity Platform<\/a> offers visibility into the MCP interaction chain, as well as alerts and automated incident response, for both local and remote MCP servers.<\/p>\n<p>VMware: In August, parent company Broadcom <a href=\"https:\/\/www.networkworld.com\/article\/4045708\/vmware-explore-2025-broadcom-tackles-agentic-ai-security-challenges.html\">announced<\/a> that VMware Cloud Foundation will offer more security for agentic workflows, including MCP servers.<\/p>\n<h3 class=\"wp-block-heading\">Startups<\/h3>\n<p>Acuvity: <a href=\"https:\/\/acuvity.ai\/\">Acuvity<\/a> secures MCP servers by hardening them with least-privilege execution, immutable runtimes, continuous vulnerability scanning, authentication, and threat detection.<\/p>\n<p>Akto: API security company Akto launched an <a href=\"https:\/\/www.akto.io\/mcp-security\">MCP security<\/a> solution in June, claiming to be the first dedicated security solution specifically built to protect MCP servers. It includes a discovery tool for finding the MCP servers deployed in corporate environments, security testing tools, and monitoring and threat detection.<\/p>\n<p>Invariant Labs: Their <a href=\"https:\/\/github.com\/invariantlabs-ai\/mcp-scan\">MCP-Scan<\/a> is an open-source scanner that performs static analysis of MCP servers and does real-time monitoring to detect tool poisoning attacks, rug pulls, and prompt injection attacks. A commercial product, Invariant Guardrails, is a proxy that sits between AI agents and MCP servers and protects against project injections and other MCP security threats, and allows companies to impose rules such as prohibiting PII from going to external email addresses.<\/p>\n<p>Javelin: The company\u2019s <a href=\"https:\/\/www.getjavelin.com\/ai-security\">AI Security Fabric platform<\/a> includes MCP security, such as functionality to scan for risky servers, or to block or require review of agent tools or data requests. In addition, MCP guardrails stop unsafe calls and poisoned inputs in real-time and prevent prompt injections and data leakage.<\/p>\n<p>Lasso Security: Open source <a href=\"https:\/\/github.com\/lasso-security\/mcp-gateway\">MCP gateway<\/a> that allows configuration and lifecycle management of MCP servers and sanitizes sensitive information in MCP messages.<\/p>\n<p><a href=\"https:\/\/go.mcptotal.io\/\">MCPTotal<\/a>: Offers a hub to manage, run and monitor MCP servers in a secure, sandboxed environment, as well as a gateway to protect AI workflows interacting with both internal and external MCP servers, and a governance tool to monitor and enforce AI tool use policies.<\/p>\n<p>Noma: Recently launched <a href=\"https:\/\/noma.security\/solutions\/ai-agent-security\/\">AI Agent Security<\/a> solution offers support for discovery of MCP connections, vulnerability scanning, access policy enforcement, real-time prompt guardrails, and audit trails.<\/p>\n<p>Obot: The <a href=\"https:\/\/obot.ai\/\">Obot MCP gateway<\/a> is an open-source platform to manage MCP servers, define security access policies, and track usage and compliance.<\/p>\n<p>Operant: Operant <a href=\"https:\/\/www.operant.ai\/solutions\/mcp-gateway\">MCP Gateway<\/a> automatically catalogs MCP tools, discovers AI agents, and tracks traffic between agents and servers to eliminate MCP blind spots. It can also identify threat vectors such as tool poisoning, jailbreaks and unauthorized access, prevent data leaks, and establish a centralized governance framework for agents and tools across the enterprise.<\/p>\n<p>Solo: The company\u2019s <a href=\"https:\/\/www.solo.io\/products\/agentgateway-enterprise\">Agent Gateway<\/a> was overhauled in August to support MCP and A2A protocols and protects against malicious prompts and data leaks, enforces strong authentication, and centralizes logging and tracing for every interaction.<\/p>\n<p>Teleport: Its <a href=\"https:\/\/goteleport.com\/use-cases\/secure-model-context-protocol\/\">Secure MCP<\/a> tool for its Infrastructure Identity Platform allows companies to unify how they govern human, machine, workload, device, and AI identities. MCP Security provides identity, access control, governance, and audit tools in a zero trust and least privilege environment.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Model Context Protocol allows AI agents to connect to data sources but the first iteration of this standard lacked serious security. Over the past few months, a multitude of vendors appeared to help solve the problem. Is the technology now ready for prime-time, or is it still too early to put into production? Some progress [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":5776,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-5775","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5775"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5775"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5775\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/5776"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}