Close Menu
TechUpdateAlert

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025

    You can now buy the OnePlus 15 in the US and score free earbuds if you hurry

    December 22, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455

    December 22, 2025
    Facebook X (Twitter) Instagram
    Trending
    • My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why
    • You can now buy the OnePlus 15 in the US and score free earbuds if you hurry
    • Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455
    • Android might finally stop making you tap twice for Wi-Fi
    • Today’s NYT Mini Crossword Answers for Dec. 22
    • Waymo’s robotaxis didn’t know what to do when a city’s traffic lights failed
    • Today’s NYT Wordle Hints, Answer and Help for Dec. 22 #1647
    • You Asked: OLED Sunlight, VHS on 4K TVs, and HDMI Control Issues
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechUpdateAlertTechUpdateAlert
    • Home
    • Gaming
    • Laptops
    • Mobile
    • Software
    • Reviews
    • AI & Tech
    • Gadgets
    • How-To
    TechUpdateAlert
    Home»How-To»MCP’s biggest security loophole is identity fragmentation
    How-To

    MCP’s biggest security loophole is identity fragmentation

    techupdateadminBy techupdateadminSeptember 15, 2025No Comments6 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Concept art representing cybersecurity principles
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Whenever a new technology appears, it’s usually two steps forward, one step backward. The backward step is usually security-related. Such is the story with AI, and more specifically, Model Context Protocol (MCP). Innovation keeps on running ahead of security.

    On the one hand, MCP servers have been a boon to engineers. LLMs can now speak in ‘common tongue’ to each other, to data sources, tools, and even people. They can connect to data they wouldn’t otherwise have access to, beyond training data or what’s public online.

    Usually, that means data in private systems belonging to companies. That’s so useful actually for better-behaved AI that MCP adoption may be far more widespread than most people realize, with over 15,000 MCP servers worldwide according to Backslash Security.


    You may like

    Ev Kontsevoy

    Social Links Navigation

    Co-Founder and CEO of Teleport.

    But like any tech, MCP can be exploited. Hundreds of MCP servers were recently found to leak sensitive data and facilitate remote code execution attacks due to incomplete or inadequate access controls. Trend Micro even says threat actors could target hardcoded credentials in MCP servers. Any veteran engineer could have seen that coming from a mile away.

    ‘How to secure MCP’ is therefore a question many enterprises and security teams will ask. But hackers do not attack protocols directly, which makes the better question this: how do you make your underlying infrastructure, of which MCP is one part, more resilient against common attack vectors like phishing?

    Hackers don’t attack protocols – they attack mistakes

    Almost every attack, excepting the odd zero-day exploit, begins with a mistake, like exposing a password or giving a junior employee access to privileged data. It’s why phishing via credentials abuse is such a common attack vector.

    It’s also why the risk of protocols being exploited to breach IT infrastructure doesn’t come from the protocol itself, but the identities interacting with the protocol.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    Any human or machine user reliant on static credentials or standing privileges is vulnerable to phishing. This makes any AI or protocol (MCP) interacting with that user vulnerable, too.

    This is MCP’s biggest blindspot. While MCP allows AI systems to request only relevant context from data repositories or tools, it doesn’t stop AI from surrendering sensitive data to identities that have been impersonated via stolen credentials.

    That’s a big loophole when it’s easier than ever to impersonate other users unnoticed by obtaining valid static credentials (e.g. passwords, API keys). MCP also lacks any inherent access control features.


    You may like

    So, securing MCP is really about making sure only authorized identities are interacting with AI. But knowing who or what is an authorized user is difficult in today’s landscape of fragmented identities.

    Welcome to hell, aka identity fragmentation

    Complex modern computing environments have made it harder than ever for engineers to manage and protect infrastructure. You can see one symptom of this complexity in how enterprises handle role-based access controls: many have more roles than employees.

    Think of identity management today like a big, interconnected archipelago of islands. Each island represents parts of your computing infrastructure – cloud platforms, on-prem servers, SaaS, legacy systems, etc. Each has its own customs office and passport systems, except your passport (identity) on one island doesn’t work on the next.

    Sometimes you need a passport, other times a visa. Some islands have strict guards, others barely check your credentials, and others still, well, let’s just say they lost your records entirely.

    If you’re the customs officer, it’s impossible to easily track who’s coming and going across islands. Some have outdated or fake passports floating around, which might take ages for customs to realize.

    This is hard enough if the ‘customs officer’ is a security team, but let’s say the officer’s an AI model. It won’t tell the CEO of a company apart from an impostor CEO. It only cares that ‘the CEO’ is asking for access to financial records.

    Again, that’s a blindspot for MCP, and so is the fact that a hacker could pretend to be a database, microservice, or AI agent. They could do so trivially since many machines rely on static, over-privileged credentials that can be stolen.

    MCP won’t mitigate this unless paired with a security model that lets teams manage identities of humans, machines, and AI more cohesively.

    Making identities unspoofable

    If you’re deploying MCP and AI, you should combine it with a cybersecurity approach that isn’t based on secrets and siloed identities.

    If you want to eliminate secrets, back all your identities, including AI, with cryptographic authentication (Trusted Platform Module, biometrics). Even MCP deployments have to get onboard with this, because if an API key leaks, any attacker can impersonate anyone or anything.

    So, replace those standing secrets for agents with strong, ephemeral authentication, combined with just-in-time access.

    Speaking of access, the access controls of your chosen LLM should be tied to the same identity system as the rest of your company. Otherwise, there’s not much stopping it from disclosing sensitive data to the intern asking for the highest-paid employees.

    You need a single source of truth for identity and access that applies to all identities. Without that, it becomes impossible to enforce meaningful guardrails.

    Some startups will inevitably try to solve AI security with solutions that manage AI identities in a vacuum, but that would make identity fragmentation even worse. AI doesn’t belong on an island, but in a framework where it’s aware of broader access policies for other users in your infrastructure.

    However you achieve that with tooling, you should be able to consistently apply policy across your identities from one place, whether it’s for AI, cloud services, servers, remote desktops, databases, Kubernetes, etc. Those identities should only ever have privileges when actively needed, which means no standing access on idle.

    It would be irresponsible to say that unifying identities eradicates all cybersecurity complexity. That said, a lot of the complexity disappears when you tidy your space. The more complex a system is, the more likely it is that someone will make a mistake. And mistakes are, fundamentally, what we need to prevent.

    We’ve listed the best IT management tools.

    This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

    biggest fragmentation Identity loophole MCPs security
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleApple’s new iPhone charger is a first of its kind
    Next Article LaCie Rugged SSD4 review: Fantastic, weatherwized performer — and eye-catching!
    techupdateadmin
    • Website

    Related Posts

    Gadgets

    iOS 26.2 adds an AirDrop security tool that you shouldn’t ignore on your iPhone

    December 14, 2025
    Mobile

    AT&T’s new home security system is powered by Google Home and Abode

    December 11, 2025
    Gadgets

    Google Project Aura hands-on: Android XR’s biggest strength is in the apps

    December 9, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    NYT Strands hints and answers for Monday, August 11 (game #526)

    August 11, 202547 Views

    These 2 Cities Are Pushing Back on Data Centers. Here’s What They’re Worried About

    September 13, 202542 Views

    Today’s NYT Connections: Sports Edition Hints, Answers for Sept. 4 #346

    September 4, 202540 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Best Fitbit fitness trackers and watches in 2025

    July 9, 20250 Views

    There are still 200+ Prime Day 2025 deals you can get

    July 9, 20250 Views

    The best earbuds we’ve tested for 2025

    July 9, 20250 Views
    Our Picks

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025

    You can now buy the OnePlus 15 in the US and score free earbuds if you hurry

    December 22, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455

    December 22, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2026 techupdatealert. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.