Corporate MCP Cybersecurity Explained
2. The Corporate MCP Threat Model Before designing defenses it helps to be precise about what you are defending against. An MCP server that exposes internal data — customers, schedules, payments, source code — is a much more attractive target than an arbitrary REST API, because it advertises a typed catalog of operations to anyone who can list its tools. The discoverability that makes MCP useful for an LLM also makes it useful for an attacker who has stolen a token. 2.1 Who is on the other end of Bearer ...? Every authenticated MCP request arrives with an Authorization header. Your server has to answer two questions before doing anything: is this a real token issued by an identity provider you trust, and which human does it represent? Skipping either answer collapses authent