Nightfall AI’s 2026 AI Agent Risk Report: Understand AI risk. Protect your data
Get the report

What Is MCP Security? 9 Things Every CISO Needs to Know

On this page

Your AI agents had a productive day. Nobody can tell you what data they touched.

A developer opens Cursor and connects it to a GitHub MCP server and a Postgres MCP server. The agent reads the repo to understand a schema change, finds an AWS access key in a config file, and uses it to run a migration against staging. The key now lives in the agent's context, in the Postgres query log, in the chat history, and in whatever artifact the developer copies out. No alert fired. No policy triggered. No one in security knows it happened.

This is the operating reality of Model Context Protocol (MCP) inside most enterprises today. And it is invisible to virtually every legacy data security tool deployed against it.

What is MCP security?

MCP security is the practice of monitoring and controlling how AI agents access, move, and expose data through Model Context Protocol connections, with visibility, access control, and real-time prevention of sensitive data exposure across every tool call an agent makes.

Anthropic introduced MCP in late 2024 as an open standard for connecting AI models to external systems. Often described as the USB-C port for AI, it has been adopted by OpenAI, Google, and Microsoft, and public registries now track more than 20,000 servers. Developers add an MCP connection to their AI assistant with a single line of configuration. There is no default security review, no approval workflow, and no inspection of what flows through.

What follows are nine things every CISO should internalize before approving the next agentic AI deployment in their environment.

1. MCP security is fundamentally a data security problem, not a protocol problem

Most published guidance focuses on OAuth flows, session hijacking, and confused-deputy attacks. Those matter. But the breach scenarios that get reported externally involve sensitive data flowing through tool calls at machine speed, ending up somewhere it should not be. The protocol is plumbing. The water is the risk, and the water is what regulators, customers, and the board will ask about.

2. Your existing security stack has a structural blind spot for MCP

CASB, proxy DLP, and email DLP sit on inspection points that local and direct-API MCP traffic does not traverse. Endpoint DLP has inconsistent visibility into MCP traffic, and where it does have visibility, it cannot classify what it sees: string-matching and pre-trained named-entity recognition cannot reliably identify context-sensitive data in synthesized agent outputs. If you cannot name the tool watching that traffic in your environment, you do not have coverage. The structural reasons are unpacked in 5 MCP risks hiding in your AI agent stack.

3. One compromised or buggy MCP server equals enterprise-wide blast radius

Shared MCP servers aggregate credentials and access tokens across every system they connect, and a single logic flaw in one of them can collapse tenant or organizational boundaries. The mental model is not "compromised employee." It is closer to "compromised SSO." In June 2025, Asana disclosed that a logic flaw in its newly launched MCP server allowed cross-tenant data exposure, with roughly 1,000 customer organizations affected before the bug was caught. The failure broke tenant isolation in the integration layer, exactly the kind of mistake that becomes catastrophic when one server is the front door to everything.

4. Shadow MCP is already in your environment

Developers are connecting Claude Desktop, Cursor, Windsurf, and other clients to internal systems without security review. The shadow IT problem got an order of magnitude faster, and most legacy discovery tools have no signature for it. Industry researchers note that most enterprises are unaware that dozens or even hundreds of agents are already active in their environments.

5. AI agents are a new identity class that breaks your IAM model

They are not human users and they are not service accounts. They have human-shaped access patterns (broad, contextual, exploratory) at machine speed. Most audit logs cannot distinguish agent actions from the human acting on their behalf. When an auditor asks who accessed a record, the answer is the user. The honest answer is the agent.

6. The data that actually leaves through MCP is what legacy DLP was never built to catch

Pattern-based DLP is reasonably good at credit cards and social security numbers. It is functionally blind to the data that defines competitive advantage: unreleased product roadmaps, M&A diligence, compensation bands, board materials, customer lists synthesized across CRM and email, proprietary source code, infrastructure secrets in config files. None of these has a signature. All of them are sensitive because of context.

7. The threat model is closer to insider risk than external breach

The dominant failure mode is well-meaning employees connecting overpermissioned agents to internal systems, not external attackers compromising MCP servers. Different controls, different KPIs, different reporting line. The pattern is already showing up in agentic AI generally: in September 2025, researchers disclosed ForcedLeak (CVSS 9.4), a chain in Salesforce Agentforce where embedded prompts in a Web-to-Lead form caused the agent to exfiltrate CRM data to an attacker-controlled domain. Agentforce is not MCP, but the attack class (poisoned content reaching a privileged agent, which then acts on it through trusted channels) is exactly what every MCP-connected agent is structurally exposed to. No traditional DLP would have flagged a CRM agent doing a CRM lookup.

8. "Block MCP" isn't a strategy

OpenAI, Google, Microsoft, and Anthropic all support MCP. Trying to firewall it at the proxy is the new "block USB drives": temporarily satisfying, ultimately ineffective, and directly at odds with every AI initiative the business is funding. The job is to govern MCP, not to gate it.

9. MCP observability is the new control plane

The category that solves items 1 through 8 is not another DLP product retrofitted to chase new endpoints. It is MCP observability: continuous discovery of every agent in your environment, real-time content inspection at the protocol level, and agent-attributed audit logging. This is the layer Nightfall is purpose-built for, and the full operational sequence is laid out in Nightfall's 10-step MCP monitoring checklist for 2026.

What CISOs should be doing this quarter

Three priorities translate the list above into action before the next board meeting.

Discover what already exists. Inventory every MCP server connected to corporate systems today, including those running locally on developer machines. Assume the number is larger than your team estimates and map the connector surface for each one. Most security teams discover MCP servers through Slack confessions, which is not a strategy.

Instrument the data layer. Get visibility into what is flowing through MCP tool calls now, not after the first incident is reconstructed from logs that do not exist. Classification has to handle context-dependent sensitivity (a Q4 forecast, an unreleased product spec, source code with embedded secrets), not just pattern matches.

Govern, do not gate. Build the policy, audit, and observability infrastructure that makes MCP safe enough to scale across engineering, sales, finance, and every function already experimenting with it. Blocking MCP across the enterprise is neither realistic nor desirable.

The organizations that get this right in 2026 will treat MCP as the new data control plane it is, not the integration plumbing it appears to be.

FAQ

How is MCP security different from AI security, LLM security, and API security? AI and LLM security focus on model behavior: prompt injection, jailbreaks, training data risk. API security focuses on endpoint authentication and abuse. MCP security sits at the intersection of all three. It governs the runtime data flows between AI agents and the systems they are connected to, and it is a distinct control plane rather than a subset of any one category.

What are the biggest MCP security risks? The most material risks are sensitive data exfiltration through tool calls, credential aggregation in MCP servers that creates single points of failure, shadow MCP deployments running outside security review, and overpermissioned agents operating at machine speed. Protocol-level attacks like confused-deputy abuse matter as well, but the data risks are what create regulatory and reputational exposure.

Is MCP secure by default? No. The official MCP specification explicitly states it cannot enforce security at the protocol level. Every meaningful control (authentication, classification, audit, monitoring) is the implementing organization's responsibility. No vendor can sell "MCP-compliant" the way they sell SOC 2.

Who is responsible for MCP security in an organization? Ownership is joint across security, platform and AI engineering, and the business owner of each agent. Security owns governance, monitoring, and data classification policy. Platform engineering owns MCP server implementation and authentication. The business owner of the agent owns the scope of access and the use case. Diffuse ownership is the default failure mode.

Can traditional DLP protect MCP connections? No. MCP traffic is machine-to-machine and bypasses the inspection points legacy DLP sits on (email, endpoint, proxy). Protection requires real-time classification of prompts and tool responses, which legacy tools are not architecturally built to do. MCP observability platforms and AI-native DLP fill this gap.

How do I audit MCP usage in my organization? Start with discovery: find every MCP server connected to corporate systems, including those running on developer laptops. Then instrument logging at the tool-call level with identity, agent, data classification, and action taken. Most legacy SIEM and audit tooling cannot do this natively. Agent-attributed audit is increasingly handled by MCP observability and AI-native DLP platforms.

What is the OWASP MCP Top 10? An emerging industry framework that classifies the most common MCP security risks, including confused-deputy attacks, command injection, context oversharing, and supply-chain risks in MCP server code. It is the closest thing to a vendor-neutral baseline for MCP risk assessment today.

See how Nightfall delivers MCP observability for the agentic enterprise.

Schedule a live demo

Tell us a little about yourself and we'll connect you with a Nightfall expert who can share more about the product and answer any questions you have.
Not yet ready for a demo? Read our latest e-book, Protecting Sensitive Data from Shadow AI.