NIST MCP Server providing AI assistants with comprehensive cybersecurity framework analysis capabilities
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"nist-mcp-server": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
A professional Model Context Protocol (MCP) server providing comprehensive access to NIST cybersecurity frameworks and controls. Enables AI assistants and applications to query, analyze, and manage NIST security controls through a standardized, secure interface.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in ai-ml / security
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
An open-source AI agent that brings the power of Gemini directly into your terminal.
Workspace template + MCP server for Claude Code, Codex CLI, Cursor & Windsurf. Multi-agent knowledge engine (ag-refresh / ag-ask) that turns any codebase into a queryable AI assistant.
MCP Security Weekly
Get CVE alerts and security updates for Nist Mcp Server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
A professional Model Context Protocol (MCP) server providing comprehensive access to NIST cybersecurity frameworks and controls. Enables AI assistants and applications to query, analyze, and manage NIST security controls through a standardized, secure interface.
Get started with NIST's complete control catalog in minutes:
# Install and run
git clone https://github.com/your-username/nist-mcp.git
cd nist-mcp
./scripts/install.sh
python -m nist_mcp.server
That's it! Your MCP server is now running with access to 1,196+ NIST security controls.
git clone https://github.com/your-username/nist-mcp.git
cd nist-mcp
./scripts/install.sh
python -m nist_mcp.server
That's it! Your NIST MCP server is now running with 1,196+ controls.
# 1. Clone and install
git clone https://github.com/your-username/nist-mcp.git
cd nist-mcp
pip install -e ".[dev]"
# 2. Download NIST data
python scripts/download_nist_data.py
# 3. Start server
python -m nist_mcp.server
Here are real examples of how to use the NIST MCP tools:
"What does AC-1 say?"
// Call: get_control("AC-1")
{
"id": "ac-1",
"title": "Policy and Procedures",
"class": "SP800-53",
"family": "AC",
"parts": [
{
"name": "statement",
"prose": "The organization develops and maintains a comprehensive security policy..."
}
],
"links": [...]
}
"Show me all Access Control family controls"
// Call: get_control_family("AC")
{
"family": "AC",
"name": "Access Control",
"description": "The AC family contains controls...",
"total_controls": 57,
"base_controls": 25,
"enhancements": 32,
"controls": [...]
}
"Do we meet Moderate baseline requirements?"
// Call: gap_analysis(implemented_controls=["AC-1", "AU-1"], target_baseline="moderate")
{
"total_required": 177,
"implemented_count": 2,
"missing_count": 175,
"compliance_percentage": 1.13,
"critical_gaps": ["Risk Assessment", "Configuration Management"],
"next_priorities": ["AC-2", "IA-2", "AU-2"]
}
"What's our CMMC Level 2 readiness?"
// Call: cmmc_compliance_assessment(implemented_controls=["AC-1", "IA-2"], target_level=2)
{
"current_level": 1,
"target_level": 2,
"achieved_domains": ["AC", "IA"],
"missing_domains": ["CM", "CP", "IR"],
"progress_percentage": 23.5,
"next_steps": ["Implement CM-2", "Add CP-9 controls"]
}
"How risky is our current access control implementation?"
// Call: risk_assessment_helper(control_ids=["AC-1", "AC-2", "IA-3"])
{
"overall_risk_score": 7.3,
"critical_gaps": ["AC-6 (Least Privilege)", "AC-18 (Wireless Access)"],
"recommendations": [
"Implement multi-factor authentication (IA-3)",
"Review access control policies (AC-1)",
"Add session timeout controls"
]
}