Rad Security Mcp 伺服器
概覽
什麼是 MCP 伺服器?
MCP 伺服器是由 Rad Security 開發的一個強大且高效的伺服器解決方案,旨在增強安全協議並有效管理通信。它作為管理各種安全操作的中央樞紐,確保在不同平台上維護數據的完整性和保密性。這個伺服器特別適合希望加強安全基礎設施並簡化操作的組織。
MCP 伺服器的特點
- 集中管理:MCP 伺服器允許對安全操作進行集中控制,使監控和管理安全協議變得更加容易。
- 可擴展性:該伺服器設計為隨著您的組織擴展,能夠滿足不斷增長的數據和用戶需求,而不會妨礙性能。
- 用戶友好的界面:擁有直觀的界面,用戶可以輕鬆瀏覽各種功能,對技術和非技術用戶都很友好。
- 強大的安全協議:該伺服器實施先進的安全措施,以保護敏感數據免受未經授權的訪問和違規行為。
- 集成能力:MCP 伺服器可以與現有系統和應用程序無縫集成,增強整體功能和用戶體驗。
如何使用 MCP 伺服器
- 安裝:首先從 Rad Security 官方網站下載 MCP 伺服器。按照文檔中提供的安裝說明進行操作。
- 配置:安裝後,根據您組織的安全要求配置伺服器設置。這可能包括設置用戶角色、權限和安全協議。
- 集成:將 MCP 伺服器與現有系統集成,以確保平台之間的數據流和通信順暢。
- 監控和管理:利用集中儀表板監控安全操作,管理用戶訪問,並生成安全事件報告。
- 定期更新:保持伺服器更新最新的安全補丁和功能,以確保最佳性能並防範新興威脅。
常見問題
Q1: 哪些類型的組織可以受益於使用 MCP 伺服器?
A1: MCP 伺服器適合各種組織,包括企業、教育機構和需要強大安全措施來保護敏感數據的政府機構。
Q2: MCP 伺服器易於安裝和配置嗎?
A2: 是的,MCP 伺服器的設計考慮了用戶友好性。安裝和配置過程簡單明了,並提供詳細文檔以協助用戶。
Q3: MCP 伺服器可以與其他安全工具集成嗎?
A3: 當然可以!MCP 伺服器旨在與各種安全工具和應用程序無縫集成,增強其功能和有效性。
Q4: MCP 伺服器如何確保數據安全?
A4: MCP 伺服器採用先進的安全協議,包括加密、訪問控制和定期安全更新,以保護數據免受未經授權的訪問和違規行為。
Q5: 我可以在哪裡找到 MCP 伺服器的支持?
A5: MCP 伺服器的支持可以在 Rad Security 網站上找到,使用者可以訪問文檔、常見問題解答,並聯繫支持以獲取進一步幫助。
詳細
RAD Security MCP Server
A Model Context Protocol (MCP) server for RAD Security, providing AI-powered security insights for Kubernetes and cloud environments.
Installation
npm install @rad-security/mcp-server
Usage
Prerequisites
- Node.js 20.x or higher
Environment Variables
The following environment are required required to use the MCP server with Rad Security:
RAD_SECURITY_ACCESS_KEY_ID="your_access_key"
RAD_SECURITY_SECRET_KEY="your_secret_key"
RAD_SECURITY_ACCOUNT_ID="your_account_id"
but you can also use few operations without authentication:
- List CVEs
- Get details of a specific CVE
- Get latest 30 CVEs
- List Kubernetes resource misconfiguration policies
In cursor IDE
It's quite problematic to set ENV variables in cursor IDE.
So, you can use the following start.sh script to start the server.
./start.sh
Please set the ENV variables in the start.sh script first!
In Claude Desktop
You can use the following config to start the server in Claude Desktop.
{
"mcpServers": {
"rad-security": {
"command": "npx",
"args": ["-y", "@rad-security/mcp-server"],
"env": {
"RAD_SECURITY_ACCESS_KEY_ID": "<your-access-key-id>",
"RAD_SECURITY_SECRET_KEY": "<your-secret-key>",
"RAD_SECURITY_ACCOUNT_ID": "<your-account-id>"
}
}
}
As a Docker Container - with Streamable HTTP
docker build -t rad-security/mcp-server .
docker run \
-e TRANSPORT_TYPE=streamable \
-e RAD_SECURITY_ACCESS_KEY_ID=your_access_key \
-e RAD_SECURITY_SECRET_KEY=your_secret_key \
-e RAD_SECURITY_ACCOUNT_ID=your_account_id \
-p 3000:3000 \
rad-security/mcp-server
As a Docker Container - with SSE (deprecated)
Note: The SSE transport is now deprecated in favor of Streamable HTTP. It's still supported for backward compatibility, but it's recommended to use Streamable HTTP instead.
docker build -t rad-security/mcp-server .
docker run \
-e TRANSPORT_TYPE=sse \
-e RAD_SECURITY_ACCESS_KEY_ID=your_access_key \
-e RAD_SECURITY_SECRET_KEY=your_secret_key \
-e RAD_SECURITY_ACCOUNT_ID=your_account_id \
-p 3000:3000 \
rad-security/mcp-server
Features
-
Account Inventory
- List clusters and their details*
-
Containers Inventory
- List containers and their details*
-
Security Findings
- List and analyze security findings*
-
Runtime Security
- Get process trees of running containers*
- Get runtime baselines of running containers*
- Analyze process behavior of running containers*
-
Network Security
- Monitor HTTP requests*
- Track network connections*
- Analyze network patterns*
-
Identity and Access
- List identities*
- Get identity details*
-
Audit
- List who shelled into a pod*
-
Cloud Security
- List and monitor cloud resources*
- Get resource details and compliance status*
-
Images
- Get SBOMs*
- List images and their vulnerabilities*
- Get top vulnerable images*
-
Kubernetes Objects
- Get details of a specific Kubernetes resource*
- List Kubernetes resources*
- List Kubernetes resource misconfiguration policies*
-
Threat Vector
- List threat vectors*
- Get details of a specific threat vector*
-
CVEs
- List CVEs
- Get details of a specific CVE
- Get latest 30 CVEs
*
- requires authentication and account in Rad Security.
Development
### Install dependencies
npm install
### Run type checking
npm run type-check
### Run linter
npm run lint
### Build
npm run build
License
MIT License - see the LICENSE file for details
伺服器配置
{
"mcpServers": {
"mcp-server": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"ghcr.io/metorial/mcp-container--rad-security--mcp-server--mcp-server",
"npm run start"
],
"env": {
"RAD_SECURITY_ACCESS_KEY_ID": "rad-security-access-key-id",
"RAD_SECURITY_SECRET_KEY": "rad-security-secret-key",
"RAD_SECURITY_ACCOUNT_ID": "rad-security-account-id"
}
}
}
}