# πŸ›‘οΈ Compliance GRC MCP Server β€” 2026 Complete Version ## πŸ’‘ What This Unlocks **This MCP server gives AI direct access to your entire compliance and GRC infrastructure through Vanta and Drata.** Stop clicking through dashboardsβ€”just *tell* the AI what you need to know about your compliance posture. This server integrates with two leading compliance automation platforms: - **Vanta**: Automated compliance for SOC2, HIPAA, GDPR, ISO 27001 - **Drata**: Continuous compliance monitoring and audit readiness Perfect for security teams, compliance officers, and organizations managing multiple compliance frameworks. ### 🎯 Compliance Automation Power Moves Stop context-switching between Claude and compliance dashboards. The AI can directly monitor and report on your compliance status: 1. **Real-time compliance monitoring** β€” "What's our current SOC2 readiness score? Show me any failing controls." 2. **Vulnerability management** β€” "List all critical vulnerabilities from the last 7 days across both Vanta and Drata, group by source" 3. **Audit preparation** β€” "Generate a summary of all evidence collected this month for HIPAA controls" 4. **Risk assessment** β€” "Show me all high-severity open risks and their assigned owners" 5. **Vendor risk management** β€” "List all high-risk vendors that haven't been reviewed in 90 days" 6. **Personnel compliance** β€” "Which employees haven't completed security training? Cross-reference with both platforms" 7. **Multi-framework overview** β€” "Compare our readiness across SOC2, HIPAA, and GDPR frameworks" ### πŸ”— The Real Power: Cross-Platform Intelligence AI can analyze data from both Vanta and Drata simultaneously: - Compare control implementations across platforms β†’ Identify gaps β†’ Generate remediation plan - Aggregate vulnerabilities from both systems β†’ Prioritize by risk β†’ Create action items - Cross-reference evidence collection β†’ Find redundancies β†’ Optimize compliance workflows - Monitor compliance trends β†’ Predict audit readiness β†’ Alert on degradation ## πŸ“¦ What's Inside **17 powerful API tools** covering both Vanta and Drata compliance platforms: ### Vanta Tools (8 tools) 1. **list_vanta_controls** β€” List all compliance controls (SOC2, HIPAA, GDPR, ISO 27001) 2. **get_vanta_control** β€” Get detailed control information and status 3. **list_vanta_tests** β€” List compliance tests and their results 4. **list_vanta_vulnerabilities** β€” List security vulnerabilities by severity 5. **list_vanta_evidence** β€” List collected compliance evidence 6. **list_vanta_users** β€” List users and access levels 7. **list_vanta_integrations** β€” List active integrations (AWS, GitHub, etc.) 8. **get_vanta_compliance_status** β€” Get overall compliance readiness summary ### Drata Tools (9 tools) 1. **list_drata_controls** β€” List all compliance controls 2. **get_drata_control** β€” Get detailed control information 3. **list_drata_personnel** β€” List personnel and their compliance status 4. **list_drata_vendors** β€” List third-party vendors and risk levels 5. **list_drata_risks** β€” List identified risks by severity 6. **list_drata_assets** β€” List IT assets (servers, databases, applications) 7. **list_drata_frameworks** β€” List configured compliance frameworks 8. **list_drata_evidence** β€” List collected compliance evidence 9. **get_drata_compliance_summary** β€” Get overall compliance summary All with proper error handling, automatic authentication, and TypeScript types. **API Foundations:** - [Vanta API](https://api.vanta.com) (OAuth2 client_credentials) - [Drata API](https://public-api.drata.com) (Bearer token) ## πŸš€ Quick Start ### Prerequisites **Vanta Setup:** 1. Log into your [Vanta dashboard](https://app.vanta.com) 2. Go to **Settings β†’ Integrations β†’ API** 3. Create a new OAuth2 application 4. Note your **Client ID** and **Client Secret** 5. Grant appropriate permissions (read access to controls, tests, vulnerabilities, evidence) **Drata Setup:** 1. Log into your [Drata dashboard](https://app.drata.com) 2. Go to **Settings β†’ API Keys** 3. Create a new API key with read permissions 4. Copy the API key (shown only once) ### Option 1: Claude Desktop (Local) 1. **Clone and build:** ```bash git clone https://github.com/BusyBee3333/mcpengine.git cd mcpengine/servers/compliance-grc npm install npm run build ``` 2. **Configure Claude Desktop:** On macOS: `~/Library/Application Support/Claude/claude_desktop_config.json` On Windows: `%APPDATA%\Claude\claude_desktop_config.json` ```json { "mcpServers": { "compliance-grc": { "command": "node", "args": ["/ABSOLUTE/PATH/TO/mcpengine/servers/compliance-grc/dist/index.js"], "env": { "VANTA_CLIENT_ID": "your_vanta_client_id", "VANTA_CLIENT_SECRET": "your_vanta_client_secret", "DRATA_API_KEY": "your_drata_api_key" } } } } ``` **Note:** You can configure just Vanta, just Drata, or both. At least one must be configured. 3. **Restart Claude Desktop** ### Option 2: Docker ```bash docker build -t compliance-grc-mcp . docker run -p 3000:3000 \ -e VANTA_CLIENT_ID=your_client_id \ -e VANTA_CLIENT_SECRET=your_client_secret \ -e DRATA_API_KEY=your_api_key \ compliance-grc-mcp ``` ## πŸ” Authentication ### Vanta Authentication - **Method:** OAuth2 (client_credentials flow) - **Environment Variables:** - `VANTA_CLIENT_ID` β€” Your OAuth2 client ID - `VANTA_CLIENT_SECRET` β€” Your OAuth2 client secret - **Token Management:** Automatic refresh handled by the MCP server - **Permissions Required:** Read access to controls, tests, vulnerabilities, evidence, users, integrations ### Drata Authentication - **Method:** Bearer token (API key) - **Environment Variable:** `DRATA_API_KEY` - **Format:** `drata_api_xxx...` - **Permissions Required:** Read access to controls, personnel, vendors, risks, assets, frameworks, evidence The MCP server handles all authentication automaticallyβ€”just set the environment variables. ## 🎯 Example Prompts for Compliance Teams Once connected to Claude, use natural language. Here are real compliance workflows: ### Compliance Monitoring - *"What's our current SOC2 compliance status in Vanta? Show me any failing controls."* - *"List all HIPAA controls in Drata that are unsatisfied, sorted by priority"* - *"Compare our compliance readiness across SOC2, HIPAA, and GDPR frameworks"* ### Vulnerability Management - *"Show me all critical and high-severity vulnerabilities from Vanta in the last 30 days"* - *"List open vulnerabilities grouped by source (AWS, GitHub, GCP)"* - *"Which vulnerabilities have been open for more than 90 days?"* ### Audit Preparation - *"Generate a report of all evidence collected this month for SOC2 controls"* - *"List all compliance tests that failed in the last quarter"* - *"Show me the status of all controls required for our upcoming HIPAA audit"* ### Risk & Vendor Management - *"List all high-risk vendors that haven't been reviewed in 6 months"* - *"Show me all open risks with critical severity and their assigned owners"* - *"Which vendors have access to production systems? Cross-check with Drata assets."* ### Personnel & Access - *"List all new employees added in the last 30 days and their training status"* - *"Show me users with admin access in Vanta"* - *"Which personnel haven't completed required security training?"* ### Cross-Platform Analysis - *"Compare control coverage between Vanta and Drata for SOC2"* - *"Aggregate all evidence collected across both platforms for ISO 27001"* - *"Show me overlapping integrations between Vanta and Drata"* ### Integration Health - *"List all Vanta integrations and their statusβ€”flag any errors"* - *"Show me which AWS accounts are being monitored in Vanta"* - *"Check if GitHub integration is active and pulling vulnerability data"* ## πŸ› οΈ Development ### Prerequisites - Node.js 18+ - npm or yarn - Vanta and/or Drata account with API access ### Setup ```bash git clone https://github.com/BusyBee3333/mcpengine.git cd mcpengine/servers/compliance-grc npm install cp .env.example .env # Edit .env with your API credentials npm run build npm start ``` ### Project Structure ``` compliance-grc/ β”œβ”€β”€ src/ β”‚ └── index.ts # Main server with VantaClient and DrataClient β”œβ”€β”€ dist/ # Compiled JavaScript β”œβ”€β”€ package.json β”œβ”€β”€ tsconfig.json └── README.md ``` ### Environment Variables Create a `.env` file or set these in your environment: ```bash # Vanta (OAuth2) VANTA_CLIENT_ID=your_vanta_client_id VANTA_CLIENT_SECRET=your_vanta_client_secret # Drata (API Key) DRATA_API_KEY=your_drata_api_key ``` **Note:** At least one service must be configured (Vanta or Drata or both). ## πŸ› Troubleshooting ### "At least one service must be configured" - You need to set either Vanta credentials (CLIENT_ID + CLIENT_SECRET) or Drata credentials (API_KEY) - Check that environment variables are set correctly in `claude_desktop_config.json` ### "Vanta OAuth error: 401" - Verify your `VANTA_CLIENT_ID` and `VANTA_CLIENT_SECRET` are correct - Check that your OAuth2 app has the required permissions in Vanta dashboard - Ensure the OAuth2 app is enabled and not expired ### "Drata API error: 401" - Verify your `DRATA_API_KEY` is correct and starts with `drata_api_` - Check that the API key hasn't been revoked or expired - Ensure the API key has read permissions for all required endpoints ### "Tools not appearing in Claude" - Restart Claude Desktop after updating config - Check that the path in `claude_desktop_config.json` is absolute (not relative) - Verify the build completed: `ls dist/index.js` - Check Claude Desktop logs: `tail -f ~/Library/Logs/Claude/mcp*.log` ### "Unknown tool: " - If you only configured Vanta, Drata tools won't be available (and vice versa) - The server automatically filters tools based on available credentials - Configure both services to get all 17 tools ### Rate Limits - **Vanta:** Standard rate limits apply (typically 100 requests/minute) - **Drata:** API rate limits depend on your plan - The server handles token refresh automatically for Vanta OAuth2 ## πŸ“– Resources - **[Vanta API Documentation](https://developer.vanta.com)** β€” Official Vanta API reference - **[Drata API Documentation](https://docs.drata.com/api)** β€” Official Drata API reference - **[MCP Protocol Spec](https://modelcontextprotocol.io/)** β€” How MCP servers work - **[Claude Desktop Docs](https://claude.ai/desktop)** β€” Installing and configuring Claude - **[MCPEngage Platform](https://mcpengine.pages.dev)** β€” Browse 30+ business MCP servers ## πŸ”’ Security Best Practices 1. **Never commit API keys** β€” Use environment variables or secure vaults 2. **Least privilege** β€” Grant only the read permissions needed for compliance monitoring 3. **Rotate keys regularly** β€” Follow your organization's key rotation policy 4. **Monitor API usage** β€” Check Vanta/Drata dashboards for unusual activity 5. **Audit access** β€” Review who has access to compliance data regularly ## 🀝 Contributing Contributions are welcome! Please: 1. Fork the repo 2. Create a feature branch (`git checkout -b feature/control-remediation`) 3. Commit your changes (`git commit -m 'Add control remediation tool'`) 4. Push to the branch (`git push origin feature/control-remediation`) 5. Open a Pull Request ## πŸ“„ License MIT License - see [LICENSE](LICENSE) for details ## πŸ™ Credits Built by [MCPEngage](https://mcpengine.pages.dev) β€” AI infrastructure for business software. Part of the **MCPEngine** collection covering 30+ business platforms for AI-native compliance, security, and operations. --- **Questions?** Open an issue or join our [Discord community](https://discord.gg/mcpengage).