
Operationalizing the CoSAI Risk Map (CoSAI-RM)
December 23, 2025
Coalition for Secure AI Releases Extensive Taxonomy for Model Context Protocol Security
January 27, 2026As AI agents move from experimental projects to production systems, enterprise security teams face a critical challenge: how do you secure autonomous systems that make real-time decisions and access sensitive resources? The Coalition for Secure AI (CoSAI) has released a comprehensive whitepaper addressing this exact question, focusing on Model Context Protocol (MCP)—the emerging standard that’s rapidly becoming the backbone of AI agent infrastructure.
Why MCP Security Matters Now
MCP has evolved from a novel protocol to a critical enterprise technology in just over a year. As with any rapidly adopted technology, security risks have materialized: Asana’s tenant isolation flaw affected up to 1,000 enterprises, WordPress plugins exposed over 100,000 sites to privilege escalation, and researchers demonstrated how prompt injection through support tickets could expose private database tables.
These aren’t theoretical vulnerabilities—they’re production incidents affecting real organizations, and they share a common thread: traditional security frameworks weren’t designed for AI-mediated systems where a language model sits at the center of security-critical decisions.
The Challenge: AI Changes Everything
Here’s what makes MCP security different from traditional API security: an LLM acts as an intermediary between user intent and system actions. This creates unique vulnerabilities that fall outside conventional threat models. Your firewall rules and authentication tokens matter, but they’re not enough when an AI agent can be manipulated through natural language to bypass controls you thought were locked down.
The CoSAI whitepaper identifies 12 core threat categories spanning nearly 40 distinct threats. These range from familiar security concerns amplified by AI mediation to entirely novel attack vectors unique to agent-based systems.
The 12 Threat Categories: A Quick Overview
Foundational Identity & Access (T1-T2):
- Improper Authentication: Weak identity verification and credential management across agent chains
- Missing Access Control: Insufficient authorization checks and privilege separation
Input Handling (T3-T4):
- Input Validation Failures: Traditional injection flaws amplified by AI mediation
- Data/Control Boundary Failures: The fundamental challenge of prompt injection and tool poisoning
Data & Code Protection (T5-T6):
- Inadequate Data Protection: Insufficient encryption and secrets management
- Missing Integrity Controls: Lack of verification for MCP servers and tool definitions
Network & Transport (T7-T8):
- Session/Transport Security: Insecure protocols and session management
- Network Isolation Failures: Improper network binding and segmentation
Trust & Design (T9-T10):
- Trust Boundary Failures: Overreliance on LLM judgment for security decisions
- Resource Management: Absence of rate limiting and quota controls
Operational Security (T11-T12):
- Supply Chain Failures: Insecure MCP server lifecycle and distribution
- Insufficient Observability: Lack of logging, monitoring, and audit trails
From Theory to Practice: Actionable Security Controls
Understanding the threats is just the beginning. Here’s how enterprise security teams can start protecting their MCP deployments today:
1. Implement Strong Identity Throughout the Chain
Every request should be traceable across the entire execution path—from end user through intermediate MCP servers to the final action. Consider emerging standards like SPIFFE/SPIRE for cryptographic workload identities. Most importantly: don’t pass through OAuth tokens directly. Use token exchange (RFC 8693) to maintain full accountability and prevent confused deputy attacks.
2. Apply Zero Trust to AI Agents
Treat all AI-generated content as untrusted input requiring rigorous validation. This includes everything returned from MCP servers: tool definitions, resources, prompts, and responses. Deploy prompt injection detection systems and use strict JSON schemas to maintain clear boundaries between instructions and data.
3. Sandbox Everything
MCP servers that interact with the host environment or execute LLM-generated code should always run in isolation. Containers aren’t enough—consider additional sandboxing with gVisor, Kata Containers, or SELinux. For high-security deployments, leverage Trusted Execution Environments (TEEs) with remote attestation to verify server integrity.
4. Design Tools Defensively
Each tool should have a single, clearly defined purpose with explicit boundaries. Create use-case-driven tools rather than overly permissive ones. Never rely on the LLM to perform security-critical validation—implement those controls in the tool itself. And critically: don’t assume users will catch security issues in approval prompts. Consent fatigue is real.
5. Lock Down Your Supply Chain
Implement mandatory code signing verification for all MCP servers before installation. Use private package repositories with security scanning and approval workflows. Deploy Software Composition Analysis (SCA) tools to detect vulnerable dependencies. Most importantly: maintain a centralized inventory of all deployed MCP servers and implement automated discovery to detect shadow deployments.
6. Build Observability from Day One
You can’t secure what you can’t see. Log all interactions with agents, tools, prompts, and models. OpenTelemetry provides end-to-end linkability and is being widely adopted across MCP implementations. Ensure immutable records of actions and authorizations—this is critical for both compliance and incident investigation.
The Bottom Line
Securing MCP deployments requires a fundamental shift in thinking. Traditional security controls remain necessary but insufficient. The CoSAI whitepaper provides a comprehensive framework that bridges conventional security practices with the unique challenges of AI-mediated systems.
As the report notes, Investment in security architecture now will pay dividends as agentic systems become more prevalent. The question isn’t whether your organization will deploy AI agents—it’s whether you’ll secure them properly before they’re in production.
Next Steps
The full CoSAI whitepaper provides detailed technical guidance, deployment pattern analysis, and specific threat mitigations that this overview can’t fully capture. Whether you’re just beginning your AI agent journey or already have MCP servers in production, the comprehensive threat model and control framework offers actionable guidance for building defense-in-depth strategies.
Download the complete MCP Security whitepaper to access detailed implementation guidance, threat scenarios, and best practices for securing your AI agent infrastructure.
About CoSAI: The Coalition for Secure AI is an OASIS Open Project bringing together AI and security experts from industry-leading organizations to develop best practices for secure AI deployment and collaborate on AI security research.




