Enterprise Security · IL2–IL5

Securing MCP at
Defense Enterprise Scale

When AI agents can create tickets, pull repositories, rotate credentials, and deploy services — the MCP tool layer becomes a high-value control plane. This is Fulcrum's operational guide to locking it down from IL2 through IL5, with controls informed by NIST 800-53, OWASP LLM Top 10, and DoD STIG requirements.

DT
Digital Transformations LLC
Fulcrum Platform · Security Architecture
MARCH 2026 14 MIN READ SECURITY IL5 ALIGNED

Model Context Protocol makes it straightforward for AI agents to call tools and retrieve context from systems. That convenience is also the threat surface. Once an agent can do things — create tickets, pull classified repositories, rotate keys, trigger deployment pipelines, query sensor data — the tool layer becomes the most consequential control plane in your environment. Treat it accordingly.

This guide distills operational security controls for MCP deployments at defense enterprise scale. It is aligned with NIST SP 800-53 Rev 5, OWASP Top 10 for LLM Applications, and DoD STIG requirements, and shows how Fulcrum operationalizes each control through its native architecture — not as an add-on layer, but as the platform's default behavior at every impact level.

⬡ Fulcrum Security Position
Fulcrum is designed so that security controls are not optional configurations — they are the architecture. OAuth 2.1, short-lived tokens, row-level security, immutable audit trails, and Human-in-the-Loop gates are not features you turn on. They are what the platform is. This guide explains why each control exists and how to verify it is operating correctly in your environment.
800-53
NIST control framework
alignment at every IL level
0
Long-lived credentials
in Fulcrum MCP sessions
100%
Agent actions logged
to immutable audit trail

1 Establish an MCP Server Inventory and Trust Boundary

Before any security control can be enforced, you need a complete answer to three questions: what MCP servers exist in your environment, what tools they expose, and which identities are authorized to call them. In a defense context, this is not optional hygiene — it is a prerequisite for any ATO conversation.

An unregistered MCP server in a classified environment is a shadow IT problem with an AI-shaped threat surface. It can be called by any agent that discovers it, invoked with any parameters that pass schema validation, and — without centralized logging — leave no trace in your audit record.

How Fulcrum operationalizes this: The Fulcrum workspace is the source of truth for your MCP server registry. Server onboarding flows through a structured intake task — owner, risk tier, tool manifest, approval chain — and the workspace thread captures every decision, exception, and configuration change. When an auditor asks what was authorized when, the answer lives in the workspace, not in a spreadsheet someone forgot to update.

★ ATO Implication
Your MCP server registry is a continuous ATO artifact. Every time a new server is added, a tool is modified, or an authorization exception is granted, that event needs to be captured, attributed, and timestamped. Fulcrum's immutable task and message log handles this automatically — the audit trail requires no additional tooling.

2 Treat Every Tool Call as a Privileged Operation

MCP doesn't eliminate the requirement for classical access control. It intensifies it. A tool call is not a chat message — it is an authenticated action against a real system. At IL4 and IL5, the consequences of an improperly scoped tool call can include data exfiltration, unauthorized modification of mission-critical records, or accidental exposure of controlled unclassified information to an agent operating at the wrong classification level.

The foundational principle is least privilege: every agent identity, in every workspace, for every tool interaction, gets the minimum authorization required to complete its assigned mission function — nothing more.

"The question is not whether your AI agents have too much access. At defense enterprise scale, they almost certainly do. The question is whether you can prove it, enumerate it, and revoke it on demand."
— Fulcrum Platform · Security Architecture Principles

3 Defend Against Prompt Injection and Unsafe Output Handling

OWASP's Top 10 for LLM Applications identifies two failure modes that appear consistently in deployed agent systems. Both are architectural, not incidental — they require deliberate controls, not awareness alone.

Prompt Injection occurs when untrusted external content — a ticket description, a document pulled from a repository, a message from an external system — contains instructions that cause the agent to take actions outside its authorized mission scope. At the most dangerous end of this spectrum, a carefully crafted input in a classified document repository could instruct an agent to exfiltrate data, modify access controls, or call tools it was never intended to invoke.

Insecure Output Handling occurs when an agent's output is treated as trusted and executed without validation — when generated code is deployed, when a generated IAM policy is applied, when a generated configuration file is pushed to production. The agent's confidence is not a validation mechanism. The output must be checked before it executes.

How Fulcrum operationalizes this: Fulcrum enforces a Plan-Then-Act default for all agent workflows. Before any tool-calling sequence begins, the agent posts a structured execution plan to the workspace — what tools it intends to call, with what parameters, toward what objective. This plan is visible to all workspace participants and creates a review checkpoint before any action touches a real system. The workspace thread captures the plan, the approval, and the execution record in a single continuous audit chain.

⚠ High-Risk Scenario
An agent with access to a document management system and a deployment pipeline, operating without Plan-Then-Act controls, processes a document containing injected instructions. The injection causes the agent to call the deployment pipeline with a modified configuration. Without a review gate between analysis and action, the pipeline executes before any human sees what happened. The audit trail shows the tool call — but not that it was prompted by injected content. Fulcrum's Plan-Then-Act architecture surfaces the intent before execution, giving reviewers the opportunity to catch the anomaly.

4 Human-in-the-Loop Gates for High-Impact Actions

Not every tool call requires manual review. Routine read operations, status queries, and low-risk information retrieval can run with automated oversight. But a specific category of tool calls should never execute without explicit human approval — regardless of how confident the agent is, how well-formed the request looks, or how routine the action appears in isolation.

In a defense enterprise environment, that category includes any tool call that modifies production systems, touches credentials or secrets, deletes or overwrites data, triggers irreversible actions, or operates at a higher classification level than the agent's normal workspace scope.

How Fulcrum operationalizes this: Human-in-the-Loop gates are a native primitive in the Fulcrum workspace — not a bolt-on approval workflow, but a first-class platform operation. The agent posts the pending action, the parameters, and the preview to the workspace as a structured approval task. The task is assigned to a credentialed approver. The agent cannot proceed until the task is explicitly resolved. The resolution — approval or rejection, with the approver's identity and timestamp — is captured immutably in the audit trail alongside the original tool call record.


5 Centralize MCP Traffic Through a Gateway

Direct client-to-server MCP connections scale poorly and create enforcement gaps. As the number of agents and servers in your environment grows, the number of unmonitored connection surfaces grows with it. A gateway architecture gives you a single, auditable choke point for every MCP interaction in the environment.

For IL4 and IL5 deployments, a gateway is not optional — it is the mechanism by which you can credibly assert that all tool calls are authenticated, all parameters are logged, and all traffic is rate-limited. Without a gateway, your ATO assertion about MCP security is theoretical.

Gateway Control
NIST 800-53 Ref
IL Level
Status in Fulcrum
Mutual TLS / Strong Auth
IA-3, SC-8
IL4+
NATIVE
Tool Allowlist Enforcement
AC-6, AC-17
IL2+
NATIVE
Structured Audit Logs
AU-2, AU-12
IL2+
NATIVE
Rate Limiting / Quotas
SC-5, SI-17
IL2+
NATIVE
Row-Level Security
AC-3, AC-16
IL4+
NATIVE
Short-Lived Token Rotation
IA-5, SC-28
IL2+
NATIVE
Human-in-the-Loop Gates
AC-5, CA-7
IL2+
NATIVE
Immutable Audit Trail
AU-9, AU-10
IL4+
NATIVE

6 Contain Blast Radius at Runtime

Even with a complete access control architecture, servers can be compromised, agents can behave unexpectedly, and edge cases in tool schema validation can create exploitation windows. Defense-in-depth requires treating your MCP server runtime as potentially hostile and designing containment so that a compromise of one server cannot cascade into the broader environment.

⬡ IL5 Requirement
At IL5, environment separation is not a best practice — it is a requirement. Any path between a development environment and a production environment that handles Controlled Unclassified Information or higher is a finding. Fulcrum's workspace model enforces this separation at the platform level: IL tier is a property of the workspace, and cross-tier tool calls are rejected at the gateway, not the server.

7 Treat Security as a Continuous Program, Not a One-Time Hardening Pass

NIST's AI Risk Management Framework (AI RMF 1.0) describes a four-function cycle: Govern, Map, Measure, Manage. The intent is explicit: AI security is not a checklist you complete before deployment. It is a continuous risk management program that runs in parallel with operations.

For MCP deployments at defense enterprise scale, this means the security work you do before go-live is the foundation — not the conclusion. The threat model changes as agents gain new capabilities, as tools are added to the registry, as classification levels change, and as adversaries develop new techniques for exploiting LLM agent architectures.

How Fulcrum operationalizes this: The Fulcrum workspace is the operating system for continuous improvement. Security incidents become structured tasks. Postmortem findings become new control requirements. Control requirements become workspace templates that propagate to every new deployment. The security program compounds — each incident makes the next deployment harder to attack.


Implementation Sequence for Fulcrum Deployments

If you are standing up a new Fulcrum deployment and want to implement these controls in priority order, this is the sequence. Each step builds on the last and corresponds to a specific IL readiness milestone.

1
Registry and Allowlists — IL2 Day One
Create your MCP server intake workflow in Fulcrum. Register every server with owner, risk tier, and tool manifest. Apply workspace-level tool allowlists. This is your Day One security posture and your first ATO artifact.
2
Identity Separation and Short-Lived Tokens — IL2 Week One
Create distinct service accounts for each agent role. Confirm OAuth 2.1 token scoping matches tool allowlists. Verify no persistent credentials exist in any agent configuration. Fulcrum enforces this by default — verify it is operating as expected in your deployment.
3
Plan-Then-Act and Output Validation — IL2–IL4 Transition
Configure Plan-Then-Act as the required workflow pattern for all agent tool-calling sequences. Establish output validation tasks for any agent that generates code, configurations, queries, or policies. These controls are the primary defense against prompt injection at the workflow level.
4
Human-in-the-Loop Gate Configuration — IL4 Baseline
Define the tool call categories that require HiTL approval in your environment: production writes, credential operations, classified data access, irreversible actions. Configure approval roles and assign credentialed reviewers. Validate the gate operates correctly before any production tool calls are attempted.
5
Gateway Standardization — IL4 ATO Requirement
Front all MCP server access through the Fulcrum gateway with mTLS client authentication, centralized authorization, structured audit logs, and rate limits. Validate that direct server access is blocked at the network level. Export audit logs to your SIEM for continuous monitoring.
6
Runtime Containment and Environment Separation — IL5 Prerequisite
Validate container isolation, egress restrictions, and resource quotas for all MCP servers. Confirm environment separation is enforced at the network and platform level — no cross-tier paths exist. Document the separation architecture as part of your IL5 ATO package.
7
Continuous Lifecycle Program — IL5 Sustained Operations
Establish your NIST AI RMF cycle: monthly security reviews against the Fulcrum audit trail, quarterly control coverage assessments, annual threat model updates. Incidents become tasks. Postmortems become templates. The program compounds continuously.

§ References

1
NIST AI Risk Management Framework (AI RMF 1.0) — Govern, Map, Measure, Manage cycle for continuous AI risk management.
nvlpubs.nist.gov/nistpubs/ai/nist.ai.100-1.pdf ↗
2
NIST SP 800-53 Rev 5 — Security and Privacy Controls for Information Systems and Organizations. AC, AU, IA, SC, SI control families referenced throughout.
nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf ↗
3
OWASP Top 10 for LLM Applications — Prompt Injection (LLM01) and Insecure Output Handling (LLM02) are the primary LLM-specific threats addressed in Section 3.
owasp.org/www-project-top-10-for-large-language-model-applications ↗
4
OWASP LLM Prompt Injection Prevention Cheat Sheet — Defensive patterns for input validation and context isolation in LLM agent architectures.
cheatsheetseries.owasp.org ↗
5
DoD Impact Level 5 (IL5) Security Requirements — Authorization baseline for DoD Mission Critical / National Security Systems on commercial cloud infrastructure. Pathway through Second Front Systems (current DISA PA holder at IL5).
Previous
The Refactor Cell