Skip to main content

An official website of the State of Maryland.

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Guidance for Responsible and Safe Usage

MCP SERVER SECURITY 
Guidance for Responsible and Safe Usage

Maryland Department of Information Technology (DoIT)​

  1. An Intro to MCP Servers
  2. Security Risk Landscape
  3. DoIT's Vetting Criteria for MCP Servers
  4. Safe Usage Guidelines for Maryland's State Staff
  5. Special Guidance: BYOD, Desktop Clients & Browser Agents
  6. Incident Response
  7. Accountability
  8. Responsible AI Governance​​​

1. An Intro to MCP Servers

Model Context Protocol (MCP) servers are software bridges conne​cting AI assistants to external systems (email, calendars, databases, file systems, code repositories, and enterprise SaaS tools). When MCP is enabled, the AI can take actions on your behalf: reading files, sending messages, querying databases, or executing commands. MCP is an open source standard with a public registry. This document establishes DoIT’s guidance for evaluating, approving, and safely operating MCP servers, including desktop clients and browser-based agents.

Desktop MCP clients run servers locally on your machine with access to your file system, environment variables, and local tools. Browser-based MCP agents interact with web content and online services in real time and may access authenticated sessions already open in your browser.​

2. Security Risk Landscape


The MCP ecosystem is growing rapidly but still maturing from a security standpoint. Key risks include:

Security Landscape Key Risks
Risk​​Description
Identity Boundary Collapse                When an AI agent operates through MCP servers, it acts with the full authority of the authenticated user. The system cannot distinguish between a human clicking and an AI agent acting on their behalf.
Prompt InjectionMalicious instructions hidden in documents, emails, or web pages can be executed by an MCP-connected AI agent with tool access, bypassing normal safeguards.  The agent treats the tool access as trusted.
Tool Poisoning    
Tool Poisoning  AttackersAttackers alter descriptions/behaviors of tools registered within an approved MCP server, causing the AI to perform unauthorized actions or exfiltrate data.
Excessive PermissionsAnalysis of 2,500+ MCP plugins found many had overly broad access (file system, shell, network) granted simultaneously without scoping.​​
Insecure CredentialsOf 5,200 open-source MCP servers analyzed, 53% rely on static API keys; only 8.5% use OAuth. Hardcoded credentials are easily leaked.​
Supply Chain AttacksMalicious packages mimicking trusted ones on npm/PyPI. A vulnerability in mcp-remote (CVE-2025-6514, CVSS 9.6) compromised 437,000+ environments.
Desktop/Local RisksLocal MCP servers execute code directly on the user’s machine. If misconfigured, they may listen on all network interfaces (not just localhost), lack authentication, or execute OS commands with full user privileges.
Browser Agent RisksBrowser-based MCP agents operate within your active browser session, which may already be authenticated to sensitive enterprise systems. This may enable man-in-the-browser attacks, unintended session access, and phishing-triggered actions.
Confused DeputyAn MCP server may perform operations with broader privileges than the triggering user was meant to have.
Inadequate Audit LoggingThe ecosystem lacks standardized audit logging, making incident investigation and compliance reporting extremely difficult.​

3. DoIT's Vetting Criteria for MCP Servers

Approval Before Use: No MCP server may be connected to enterprise systems without prior review and approval by the Office of Security Management (OSM). Submit requests through the DoIT Intake Process (email [email protected], cc your agency’s portfolio officer). “Shadow” MCP servers—those installed without DoIT knowledge—are prohibited.

Server Vetting Criteria:

Serving Vetting Criteria
Criteria​Requirement
Source/PublisherKnown, reputable vendor or verified open-source projec​​​t
AuthenticationMust support OAuth 2.1 or equivalent; static keys are disqualifying
Code SigningServer binaries/packages must be cryptographically signed
Scope of AccessMinimum required permissions only
Audit LoggingTamper-resistant logs of all tool invocations
Vulnerability HistoryReview CVE databases and recent disclosures
Data HandlingMust comply with DoIT Data Classification Policy​

Approved Server Registry: OSM will maintain a registry of approved MCP servers as part of the State's AI inventory. Users must only connect servers from this registry.  If a server you want is not on the registry, submit a  request for review.​​

4. Safe Usage Guidelines for All Staff

Safe Usage Guidelines for all Staff
 Guideline
​DoOnly connect to DoIT-approved MCP servers
DoApply least privilege—grant only permissions needed for your specific task
DoRead confirmation prompts carefully before MCP tools execute; decline if unclear
DoTreat external content (documents, emails, web pages) with skepticism—they may contain hidden instructions
DoReport unusual agent behavior to the MD-SOC immediately
​DoKeep client software and MCP server packages updated promptly
Don'tConnect personal/third-party MCP servers to State systems without approval
Don'tShare MCP configuration files (may contain credentials) via email, chat, or version control
Don'tGrant shell/OS command access unless explicitly required and approved
Don'tAllow MCP servers to bind to 0.0.0.0 (unrestricted network listening)
Don'tAssume first-party servers are fully safe—even known vendors have had incidents
​​Don'tProcess Level 3-Confidential or Level 4-Restricted data without explicit authorization and approved configuration

5. Special Guidance: BYOD, Desktop Clients & Browser Agents

  • 5.1 BYOD — Default Position: Prohibited​​​​​
  • 5.2 Desktop MCP Clients​
  • 5.3 Browser-Based MCP Agents

6. Incident Response

If you suspect an MCP server has behaved maliciously, taken unauthorized actions, or exposed sensitive data:

  1. Disconnect the MCP server immediately from your AI client.
  2. Do not investigate or remediate independently. Preserve logs and configuration files.
  3. Contact the MD-SOC within 1 hour (24x7): Online: For cybersecurity incident report | Email: [email protected] | Phone: 410-697-9700, option 5
  4. Document what happened: the task, the agent’s actions, and affected systems/data.

The MD-SOC will conduct forensic analysis, notify affected parties, and determine regulatory reporting obligations.​​

7. Accountability

Individual users: Use only approved MCP servers; follow Section 4 guidelines.
Team leads/managers: Ensure team awareness; report shadow MCP deployments to OSM.
DoIT OSM:​ Maintain approved registry within the State's AI inventory; conduct periodic audits; publish updated guidance.​ 

​8. Responsible AI Governance

All MCP deployments are subject to the State of Maryland's Responsible AI Policy and its seven Guiding Principles, the AI Implementation Guidance, and the Data Classification Policy. Where this document and State policy conflict, State policy governs.​

Guiding Principles Applied to MCP:

Guiding Principles Applied to MCP
Principle​MCP Obligation
Human-Centered DesignAgents augment, not replace, human judgment. Autonomous public-facing actions require human review.
Security & SafetyAll servers must pass vetting criteria in Section 3.
PrivacyAgents must not process PII beyond what is necessary for the approved use case.
TransparencyStaff/constituents informed when AI is involved; tool invocations logged.
EquityAgents affecting constituents evaluated for bias; high-risk cases need formal AI Risk Assessment.
AccountabilityEach deployment has a named AI lead responsible for compliance.
EffectivenessServers must deliver reliable, accurate outputs with periodic review.​

​​AI Risk Classification:​ 

​AI Risk Classification
Tier​Requirements
UnacceptableProhibited. No fully automated decision-making violating fundamental rights, covert biometric ID, social scoring, emotion analysis, or cognitive manipulation.
High-RiskEnhanced controls: AI Risk Assessment, documented mitigation, ongoing monitoring, named human oversight, agency AI lead approval + DoIT notification. Applies to health, safety, law enforcement, eligibility, financial/legal rights, Level 3–4 data.
Limited RiskStandard DoIT intake + server vetting. Internal efficiency tools on Level 1–2 data without autonomous constituent-affecting decisions.
Minimal RiskStandard DoIT intake; no additional AI-specific controls beyond this document.​​

Data Classification & MCP Access:

Data Classification & MCP Access
Data LevelMCP Access Guidance
Level 1 – PublicPermitted with standard intake and approved server
Level 2 – ProtectedPermitted with standard intake, approved server, and audit logging enabled
Level 3 – ConfidentialHigh-risk controls; AI Risk Assessment mandatory; human oversight for any agent action
Level 4 – RestrictedHigh-risk controls; explicit written authorization from agency head; no BYOD access​

Human Oversight: Irreversible actions (deletions, official communications, form submissions, DB modifications) require explicit human confirmation. Constituent-facing decisions need human review. Chained/multi-step workflows require scrutiny at each step. Staff must be able to explain what an agent did and why.  

Prohibited Uses: Real-time/covert biometric identification, emotion analysis, social scoring, cognitive behavioral manipulation, and fully automated agentic decisions in Unacceptable Risk categories with no human in the loop.​  

Sunset & Retirement: Deployments that no longer meet their purpose, produce biased/harmful outputs, or are reclassified to a higher risk tier must be halted (unless excepted by the agency head), reported to DoIT/AI Subcabinet for high-risk cases, remediated if cessation would disrupt services, and removed from the active AI Inventory.​​