Secure MCP servers exposed over HTTP or SSE by enforcing authentication, validating input, limiting exposure, and monitoring usage.
Overview
When you expose MCP servers over HTTP or Server-Sent Events (SSE), treat them as production-grade APIs. These endpoints provide powerful entry points into your systems and must be secured accordingly.
Require authentication and authorization
Require every request to include a valid identity, such as an API key or IMS token.
Apply authorization rules to restrict access to sensitive tools, write operations, and tenant-specific data.
Ensure that only permitted users or services can invoke high-impact actions.
Use HTTPS by default
Expose MCP endpoints over HTTPS with valid TLS certificates.
Do not use plain HTTP except on secured local development environments.
Disable weak protocols and cipher suites when terminating TLS.
Limit exposed capabilities
Expose only the tools intended for external use.
Separate read-only tools from tools that modify data or trigger actions.
Place sensitive tools behind stricter authorization policies or separate endpoints where appropriate.
Validate input carefully
Enforce schemas for tool parameters.
Validate data types, required fields, and size limits.
Reject malformed or unexpected values early to reduce backend exceptions and security risks.
Control and monitor usage
Apply rate limits per client or user.
Monitor for unusual patterns, such as sudden traffic spikes, repeated failures, or abuse of specific tools.
Configure alerts to enable rapid investigation of suspicious activity.
Isolate high-risk servers
Deploy MCP servers that interact with critical systems in restricted network segments.
Allow access only from explicitly approved clients or services.
Apply additional network-level and infrastructure-level protections for production and infrastructure tooling.
Share this page
Was this page helpful?
We're glad. Tell us how this page helped.
We're sorry. Can you tell us what didn't work for you?
Thank you for your feedback. Your response will help improve this page.