mcp-server-for-oscal
Health Gecti
- License — License: Apache-2.0
- Description — Repository has a description
- Active repo — Last push 0 days ago
- Community trust — 30 GitHub stars
Code Basarisiz
- rm -rf — Recursive force deletion command in bin/refresh-nist-docs.sh
- rm -rf — Recursive force deletion command in bin/update-aws-cdefs.sh
Permissions Gecti
- Permissions — No dangerous permissions requested
This MCP server equips AI assistants with specialized tools to accurately work with NIST's Open Security Controls Assessment Language (OSCAL). It runs locally and provides authoritative guidance on OSCAL architecture and implementation without needing external network access.
Security Assessment
Overall Risk: Low. By design, the server's default tools do not connect to remote services; all necessary content is bundled locally. As a strong security measure, it uses build-time SHA-256 manifests to verify file integrity upon startup, protecting against malicious tampering. However, automated scans flagged the use of `rm -rf` (recursive force deletion) inside two helper scripts (`bin/refresh-nist-docs.sh` and `bin/update-aws-cdefs.sh`). While these commands are typically standard for cleaning up local directories during development builds, developers should be aware of them. No dangerous permissions or hardcoded secrets were detected in the core application.
Quality Assessment
This project demonstrates strong health and maintenance signals. It is actively maintained (with repository activity as recent as today) and is backed by AWS Labs, providing a high baseline of organizational trust. The repository is well-documented, transparent about its current limitations (such as lacking transport security for HTTP), and operates under the highly permissive and standard Apache-2.0 license. It has garnered 30 GitHub stars, indicating early but growing community adoption.
Verdict
Safe to use. It is a well-structured, locally contained tool with robust integrity checks and a low-risk profile.
OSCAL tools for AI agents
MCP Server for OSCAL
Instant OSCAL expertise for your favorite AI agentA Model Context Protocol (MCP) server that provides AI assistants (Claude, Cline, Kiro, Claude Code, etc.) with tools to work with NIST's Open Security Controls Assessment Language (OSCAL). Like many early adopters, we needed help implementing OSCAL proofs-of-concept to demonstrate value to business stakeholders. Perhaps due to limited availability of examples in the public domain, we found that most AI agents/LLMs alone produced inconsistent results related to OSCAL. The tools in this MCP server minimized that problem for our use-case and we hope it does the same for you.
[!TIP]
To get started, see Installation below.
Features
Together, the tools provided by this MCP server are meant to enable your preferred AI assistant to provide accurate, authoritative guidance about OSCAL architecture, models, use-cases, requirements, and implementation. You don't need to understand the tools to use them, but details are in the tools directory.
The server is lightweight and meant to run locally without additional setup. By default, it uses stdio protocol for MCP transport. Do not attempt to use the server with streamable-http transport, as we've not yet implemented transport security or authentication.
The default tools should not connect to any remote services or resources - all required content is bundled with the server. As a security measure, we've implemented basic file integrity verification for bundled content. At build-time we generate manifests including SHA-256 hashes of all content files. Each time the server starts, all content files are verified against the hash manifests. Any mismatch should produce an error and prevent startup.
In addition to the MCP server, the package includes a standalone OSCAL agent built with Strands Agents. See the OSCAL Agent section below.
What is OSCAL?
OSCAL (Open Security Controls Assessment Language) is a set of framework-agnostic, vendor-neutral, machine-readable schemas developed by NIST that describe the full life cycle of GRC (governance, risk, compliance) artifacts, from controls to remediation plans. OSCAL enables automation of GRC workflows by replacing digital paper (spreadsheets, PDFs, etc.) with a standard-based structured data format. To learn more about OSCAL, install this MCP server then ask your AI. Or see the official OSCAL website.
What is MCP?
MCP (Model Context Protocol) is an open-source standard for connecting AI applications to external systems. Think of MCP like a USB-C port for AI applications. Just as USB-C provides a standardized way to connect electronic devices, MCP provides a standardized way to connect AI applications to external systems.
How to use / examples
Examples below were created with kiro-cli, but should work with any AI assistant that supports MCP servers.
Example 1: Learn about available OSCAL models
% kiro-cli
> /tools trust get_oscal_schema list_oscal_models list_oscal_resources
Tools '@oscal/get_oscal_schema', '@oscal/list_oscal_models', '@oscal/list_oscal_resources' are now trusted. I will not ask for confirmation before running these tools.
> How many GA OSCAL models are there?
> I'll check the available OSCAL models to find out how many are in GA (Generally Available) status.
Running tool list_oscal_models with the param (from mcp server: oscal)
⋮ {}
- Completed in 0.1s
> There are 8 GA OSCAL models:
Control Layer (3):
- Catalog
- Profile
- Mapping Collection
Implementation Layer (2):
- Component Definition
- System Security Plan (SSP)
Assessment Layer (3):
- Assessment Plan (SAP)
- Assessment Results (SAR)
- Plan of Action and Milestones (POA&M)
All of these models have "GA" (Generally Available) status, meaning they are stable and ready for production use.
▸ Time: 8s
Example 2: OSCAL template generation
> generate a minimum, valid, OSCAL mapping in JSON for use as a template.
> I'll help you create a minimal, valid OSCAL mapping in JSON. Let me first check what OSCAL models are available to understand the structure.
Running tool list_oscal_models with the param (from mcp server: oscal)
⋮ {}
- Completed in 0.1s
> Now let me get the schema for the mapping-collection model to understand its structure:
Running tool get_oscal_schema with the param (from mcp server: oscal)
⋮ {
⋮ "model_name": "mapping-collection",
⋮ "schema_type": "json"
⋮ }
- Completed in 0.14s
> Based on the schema, I'll create a minimal, valid OSCAL mapping collection template. Here's the absolute minimum required structure:
I'll create the following file: ./oscal-mapping-template.json (using tool: write)
Purpose: Create minimal OSCAL mapping collection template
+ 1: {
+ 2: "mapping-collection": {
+ 3: "uuid": "12345678-1234-4567-8901-123456789012",
+ 4: "metadata": {
+ 5: "title": "Sample Mapping Collection",
+ 6: "last-modified": "2026-01-06T20:46:28.034Z",
+ 7: "version": "1.0",
+ 8: "oscal-version": "1.2.0"
+ 9: },
+ 10: "provenance": {
+ 11: "method": "human",
+ 12: "matching-rationale": "semantic",
+ 13: "status": "draft",
+ 14: "mapping-description": "Sample mapping between two control frameworks"
+ 15: },
+ 16: "mappings": [
+ 17: {
+ 18: "uuid": "87654321-4321-7654-1098-210987654321",
+ 19: "source-resource": {
+ 20: "type": "catalog",
+ 21: "href": "https://example.com/source-catalog.json"
+ 22: },
+ 23: "target-resource": {
+ 24: "type": "catalog",
+ 25: "href": "https://example.com/target-catalog.json"
+ 26: },
+ 27: "maps": [
+ 28: {
+ 29: "uuid": "11111111-2222-3333-4444-555555555555",
+ 30: "relationship": "equivalent",
+ 31: "sources": [
+ 32: {
+ 33: "type": "control",
+ 34: "id-ref": "ac-1"
+ 35: }
+ 36: ],
+ 37: "targets": [
+ 38: {
+ 39: "type": "control",
+ 40: "id-ref": "access-control-policy"
+ 41: }
+ 42: ]
+ 43: }
+ 44: ]
+ 45: }
+ 46: ]
+ 47: }
+ 48: }
Creating: ./oscal-mapping-template.json
- Completed in 0.8s
> I've created a minimal, valid OSCAL mapping collection template at ./oscal-mapping-template.json. This template includes:
Required elements:
- uuid: Unique identifier for the mapping collection
- metadata: Document metadata with title, last-modified timestamp, version, and OSCAL version
- provenance: Mapping methodology information including method, matching rationale, status, and description
- mappings: Array containing at least one mapping with:
- uuid: Mapping identifier
- source-resource and target-resource: References to the catalogs being mapped
- maps: Array with mapping entries showing relationships between controls
Key features:
- Uses placeholder UUIDs (replace with actual UUIDs in production)
- Maps a source control "ac-1" to target control "access-control-policy" with "equivalent" relationship
- Includes minimal required fields only
- Valid JSON structure conforming to OSCAL 1.2.0 schema
You can customize this template by:
- Replacing placeholder UUIDs with real ones
- Updating the resource URLs to point to actual catalogs
- Adding more mapping entries in the maps array
- Modifying control IDs and relationships as needed
▸ Time: 21s
Example 3: Discover open source OSCAL catalogs
> What are some open source OSCAL catalogs?
Running tool list_oscal_resources with the param (from mcp server: oscal)
⋮ {}
- Completed in 0.51s
> Based on the OSCAL community resources, here are some notable open source OSCAL catalogs:
## Government/Official Catalogs
Australian Cyber Security Centre (ACSC)
- Information Security Manual (ISM) controls in OSCAL format
- Essential Eight Maturity Levels (ML1, ML2, ML3)
- Available at: https://www.cyber.gov.au/ism/oscal
CMS Acceptable Risk Safeguards (ARS)
- Tailored NIST SP 800-53 controls for Centers for Medicare and Medicaid Services
- Available at: https://github.com/CMSgov/ars-machine-readable
GovTech Singapore
- ICT&SS Policy catalog and profile for low-risk systems
- Available at: https://github.com/GovtechSG/tech-standards
## Industry/Standards Organizations
Center for Internet Security (CIS)
- CIS Critical Security Controls (formerly Top 18/20)
- Available at: https://github.com/CISecurity/CISControls_OSCAL/
Cloud Security Alliance (CSA)
- Cloud Controls Matrix v4 in OSCAL format
- Available at: https://cloudsecurityalliance.org/artifacts/ccm-machine-readable-bundle-json-yaml-oscal/
NIST SP 800-171 (Community)
- Maintained by Fathom5
- Available at: https://github.com/FATHOM5/oscal/tree/main/content/SP800-171/oscal-content
## Community Collections
CivicActions Component Definitions
- Cloud services, software, security and privacy controls
- Available at: https://github.com/CivicActions/oscal-component-definitions
RedHat OSCAL Content
- Component definitions: https://github.com/RedHatProductSecurity/oscal-component-definitions
- Custom profiles: https://github.com/RedHatProductSecurity/oscal-profiles
Brad Hards ISM Catalog
- Australian Government ISM controls (community version)
- Available at: https://github.com/bradh/ism-oscal
These catalogs provide ready-to-use OSCAL content for various compliance frameworks and can serve as templates or starting points for your own OSCAL implementations.
▸ Time: 15s
Example 4: Query component definitions for information about AWS services
[OSCAL] > what components are available for Cognito?
Running tool list_components with the param (from mcp server: oscal-dev)
⋮ {}
- Completed in 0.49s
> There are 3 Cognito-related components available:
1. Cognito Identity - from "Cognito Identity Pools" component definition
2. Cognito Sync - from "Amazon Cognito Sync" component definition
3. Cognito Identity Provider - from "Amazon Cognito Identity User Pools" component definition
▸ Time: 7s
[OSCAL] > show me the names and IDs from all 3 components
Running tool query_component_definition with the param (from mcp server: oscal-dev)
⋮ {
⋮ "query_type": "by_uuid",
⋮ "query_value": "7fd5d354-6ec4-4f8e-8c5f-2904086bb597"
⋮ }
Running tool query_component_definition with the param (from mcp server: oscal-dev)
⋮ {
⋮ "query_type": "by_uuid",
⋮ "query_value": "a1d82e1d-3733-41f4-bc09-90ab47b9e82f"
⋮ }
Running tool query_component_definition with the param (from mcp server: oscal-dev)
⋮ {
⋮ "query_type": "by_uuid",
⋮ "query_value": "2519deaf-4612-4c70-aba2-d9080ae3c816"
⋮ }
- Completed in 0.13s
- Completed in 0.6s
- Completed in 0.6s
> 1. Cognito Sync
- Service ID: Cognito Sync
- API Endpoint Prefix: cognito-sync
- ARN Namespace: cognito-sync
2. Cognito Identity Provider
- Service ID: Cognito Identity Provider
- API Endpoint Prefix: cognito-idp
- ARN Namespace: cognito-idp
3. Cognito Identity
- Service ID: Cognito Identity
- API Endpoint Prefix: cognito-identity
- ARN Namespace: cognito-identity
▸ Time: 12s
[OSCAL] > show me everything in the EC2 component definition
Running tool query_component_definition with the param (from mcp server: oscal-dev)
⋮ {
⋮ "component_definition_filter": "Elastic Compute Cloud (EC2)",
⋮ "query_type": "all"
⋮ }
- Completed in 0.14s
> The EC2 component definition contains 1 component:
Component: EC2
- UUID: 66345eb9-7c0d-435c-b2b5-675fd977de80
- Type: service
- Description: Empty
Properties:
- Service ID: EC2
- Version: 2016-11-15
- Availability: REGIONAL and ZONAL
- Full Name: Elastic Compute Cloud (EC2)
- API Endpoint Prefix: ec2
- ARN Namespace: ec2
Regional Availability (34 regions):
Africa (Cape Town), Asia Pacific (Hong Kong, Tokyo, Seoul, Osaka, Mumbai, Hyderabad, Singapore, Sydney, Jakarta, Melbourne, Malaysia), Canada (Central, Calgary), China (Beijing, Ningxia),
Europe (Frankfurt, Zurich, Stockholm, Milan, Spain, Ireland, London, Paris), Israel (Tel Aviv), Middle East (UAE, Bahrain), South America (Sao Paulo), US East (N. Virginia, Ohio), AWS
GovCloud (US-East, US-West), US West (N. California, Oregon)
▸ Time: 10s
[OSCAL] > what's the ID of the Jakarta region?
> Based on the EC2 component data I just retrieved, the Jakarta region's resource fragment ID is:
8041109b-0a0b-46cc-bddb-91d703667637
This is the UUID for the "Asia Pacific (Jakarta)" region component.
▸ Time: 3s
[OSCAL] > get the region ID from that component
Running tool query_component_definition with the param (from mcp server: oscal-dev)
⋮ {
⋮ "query_type": "by_uuid",
⋮ "query_value": "8041109b-0a0b-46cc-bddb-91d703667637"
⋮ }
- Completed in 0.13s
> The region ID for Jakarta is: ap-southeast-3
▸ Time: 7s
[OSCAL] > /quit
Installation
Follow these instructions to setup the MCP server for use with your preferred IDE, AI agent, chatbot, etc. The server is published as Python package on PyPI. The uvx command (shown below) automatically downloads the latest version of the server from PyPI on startup.
[!NOTE]
To setup for development instead, see DEVELOPING.md
Prerequisites
uvpackage manager for Python (Installation instructions)- Python 3.11 or higher (
uv install python 3.12). The server may work with later versions of Python, but we only test 3.11 & 3.12 for now.
Configuring IDEs and AI Tools
This server communicates via stdio (standard input/output) and can be integrated with various IDEs and agentic tools that support the Model Context Protocol. The configuration examples shown below are for your preferred IDE / chatbot / agent.
Configuration Format
Most MCP-compatible tools use a JSON configuration format described in the FastMCP documentation. Here's the basic structure:
{
"mcpServers": {
"oscal": {
"command": "uvx",
"args": ["mcp-server-for-oscal@latest"]
}
}
}
For typical, runtime use of the MCP server, additional configuration should not be required. If needed, runtime environment variables can be configured in an "env": {} object as described in the FastMCP documentation. See the file dotenv.example for available options.
[!Note]
A dotenv file is only needed in a development environment.
Kiro Configuration
See Kiro's MCP documentation for additional options. Add to your .kiro/settings/mcp.json:
{
"mcpServers": {
"oscal": {
"command": "uvx",
"args": ["mcp-server-for-oscal@latest"],
"env": {},
"disabled": false,
"autoApprove": [
"*"
]
}
}
}
Claude Desktop
Add to your ~/.claude/claude_desktop_config.json:
{
"mcpServers": {
"oscal": {
"command": "uvx",
"args": ["mcp-server-for-oscal@latest"]
}
}
}
VS Code
Run the MCP: Open User Configuration command, which opens the mcp.json file in your user profile. You can then manually add the server configuration to the file. See the VSCode/Copilot docs for additional options and details.
{
"servers": {
"oscal": {
"command": "uvx",
"args": ["mcp-server-for-oscal@latest"]
}
}
}
Using your own OSCAL Content
By default, the server ships with bundled OSCAL content (AWS component definitions, OSCAL documentation, and schemas). You can also point the server at a directory of your own OSCAL JSON files — catalogs, SSPs, profiles, assessment plans, assessment results, POA&Ms, or mapping collections. The server indexes them at startup and makes them available through all query and list tools.
Set the OSCAL_DOCUMENTS_DIR environment variable to the path of your OSCAL content directory. The path can be absolute or relative to the server's package directory. For example, in your MCP configuration:
{
"mcpServers": {
"oscal": {
"command": "uvx",
"args": ["mcp-server-for-oscal@latest"],
"env": {
"OSCAL_DOCUMENTS_DIR": "/path/to/your/oscal/files"
}
}
}
}
The server scans the directory recursively for .json files and indexes any valid OSCAL documents it finds. Your content is merged with the bundled content — both are queryable in the same session.
Two additional environment variables control the OSCAL store behavior:
| Variable | Default | Description |
|---|---|---|
OSCAL_DOCUMENTS_DIR |
(empty) | Directory containing your OSCAL JSON files. Not scanned when empty. |
OSCAL_STORE_DB_PATH |
(empty) | Path to a persistent SQLite database. When set, the index is reused across server restarts instead of being rebuilt each time. |
OSCAL_STORE_CACHE_SIZE |
100 |
Maximum number of parsed OSCAL documents to keep in the in-memory LRU cache. |
[!TIP]
SettingOSCAL_STORE_DB_PATHis recommended if you have a large collection of OSCAL documents. The server only needs to index new or changed files on subsequent startups.
OSCAL Agent
In addition to the MCP server, the package includes a standalone OSCAL agent built with Strands Agents. The agent uses the same tools as the MCP server and can be run directly:
# Via entry point
oscal-agent
# Or via module
python -m mcp_server_for_oscal.oscal_agent
The agent requires AWS Bedrock access and uses the same configuration environment variables as the MCP server.
Session Persistence
The agent supports session persistence so that conversation history and agent state survive across invocations. Choose between local filesystem or Amazon S3 storage:
# File-based session storage (new session)
oscal-agent --session-storage file
# Resume a previous session
oscal-agent --session-storage file --session-id <your-session-id>
# S3-based session storage
oscal-agent --session-storage s3 --session-s3-bucket my-bucket
When session storage is enabled without a --session-id, a UUID is auto-generated and displayed so you can resume later. Session defaults can also be set via environment variables (see DEVELOPING.md).
Conversation Management
For long-running workflows, you can select a conversation manager to control how the agent's context window is maintained:
# Summarize older messages to keep context manageable
oscal-agent --session-storage file --conversation-manager summarizing
# Sliding window (SDK default behavior)
oscal-agent --conversation-manager sliding-window
# No conversation management
oscal-agent --conversation-manager null
Existing tools and features cover a variety of use-cases but are far from comprehensive. Please share your feedback, feature requests, questions, or bug reports in a GitHub issue. Direct contributions are wanted and welcome.
Development
See DEVELOPING to get started.
Security
See CONTRIBUTING for more information.
Known limitations
- It's not yet possible to use this MCP server with ChatGPT due to limited MCP support by ChatGPT.
- The
streamable-httptransport does not yet implement authentication or transport security. Usestdiofor production workloads.
Related projects
Experimental Component Definitions for AWS services are bundled with this MCP server. You can find that content in the AWS Labs project OSCAL Content for AWS Services.
MCP Server for OSCAL uses compliance-trestle for certain capabilities, including OSCAL content validation.
License
This project is licensed under the Apache-2.0 License.
Yorumlar (0)
Yorum birakmak icin giris yap.
Yorum birakSonuc bulunamadi