Skip to main content

MCP server for querying security framework controls (SCF) - map between ISO 27001, NIST CSF, DORA, PCI DSS, and more

Project description

Security Controls MCP Server

MCP Python License SCF

Overview

THE definitive MCP server for security framework mapping. Makes 1,451 security controls across 261 frameworks searchable and AI-accessible through Claude, Cursor, or any MCP-compatible client.

Built on the Secure Controls Framework (SCF) by ComplianceForge.

Key capabilities:

  • 1,451 security controls across governance, risk, compliance, and technical domains
  • 261 frameworks including ISO 27001, NIST CSF, DORA, PCI DSS, CMMC, and 256 more
  • AI Governance: ISO 42001, NIST AI RMF, EU AI Act, Cyber Resilience Act
  • Bidirectional mapping between frameworks via SCF rosetta stone
  • Optional integration with purchased standards (ISO, NIST 800-53) for official text
  • Full-text search across all control descriptions
  • Natural language queries instead of framework-specific IDs

Why This Exists

Different frameworks describe the same security measures in different ways. ISO 27001 has one control ID, NIST CSF has another, PCI DSS has yet another — but they're all talking about the same thing.

This MCP server provides instant bidirectional mapping between any two frameworks via the SCF rosetta stone. Ask Claude "What DORA controls does ISO 27001 A.5.15 map to?" and get an immediate answer backed by ComplianceForge's framework database.

Installation

# Using pipx (recommended)
pipx install security-controls-mcp

# Using pip
pip install security-controls-mcp

# From source
git clone https://github.com/Ansvar-Systems/security-controls-mcp.git
cd security-controls-mcp
pip install -e .

Requirements: Python 3.10+

Claude Desktop Configuration

Add to claude_desktop_config.json:

{
  "mcpServers": {
    "security-controls": {
      "command": "scf-mcp"
    }
  }
}

macOS users: GUI apps don't inherit your shell's PATH. Use the full path instead:

{
  "mcpServers": {
    "security-controls": {
      "command": "/Users/YOUR_USERNAME/.local/bin/scf-mcp"
    }
  }
}

Find your path with: which scf-mcp

Config location:

  • macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
  • Windows: %APPDATA%\Claude\claude_desktop_config.json

Cursor / VS Code

Same configuration under "mcp.servers" in your settings.

Example Queries

  • "What does GOV-01 require?"
  • "Search for controls about encryption key management"
  • "What ISO 27001 controls map to DORA?"
  • "List all controls needed for PCI DSS compliance"
  • "Which DORA requirements does ISO 27001 A.5.15 satisfy?"
  • "Show me all NIST CSF 2.0 controls related to incident response"
  • NEW: "What ISO 42001 controls map to NIST AI RMF?"
  • NEW: "Show me EU AI Act requirements for high-risk AI systems"

Available Frameworks (261)

AI Governance (NEW in v0.4.0)

  • ISO 42001:2023 (149) - AI Management System
  • NIST AI RMF 1.0 (158) - AI Risk Management Framework
  • NIST AI 600-1 (139) - Generative AI Profile
  • EU AI Act (119) - Regulation 2024/1689
  • EU Cyber Resilience Act (18)

Core Frameworks

  • US Government: NIST 800-53 R5 (777), NIST CSF 2.0 (253), FedRAMP R5 (423), CMMC 2.0 (198/52)
  • International Standards: ISO 27001 (51), ISO 27002 (316), ISO 27017 (119), ISO 27018 (70), ISO 27701 (187), ISO 22301 (52)
  • US Industry: PCI DSS v4.0.1 (364), SOC 2 (412), HIPAA (136), SOX (2)
  • Financial: SWIFT CSCF 2023 (127), FFIEC (231), GLBA (108), DORA (103)
  • Cloud: CSA CCM v4 (334), Germany C5 (239)

Regional Coverage (50+ countries)

  • APAC: Australia ISM/Essential 8, Singapore MAS TRM, Japan ISMAP, China Cybersecurity Law, India DPDPA
  • EU: GDPR (42), NIS2 (68), PSD2 (61), plus 20+ national frameworks
  • Americas: US state laws (CA, NY, TX, etc.), Brazil LGPD, Canada PIPEDA
  • Middle East/Africa: Saudi SAMA, UAE NIAF, South Africa POPIA

Specialized

  • Industrial/OT: IEC 62443 (197), NERC CIP (224), NIST 800-82
  • Automotive: ISO/SAE 21434, TISAX, UN R155
  • Healthcare: HIPAA, HITRUST, CMS MARS-E

See docs/coverage.md for the complete list of 261 frameworks.

Tools

Core Tools

list_frameworks() - List all 261 frameworks with control counts

get_control(control_id) - Get full details for a specific SCF control

  • Returns description, domain, weight, PPTDF category, and mappings to all 261 frameworks

search_controls(query, frameworks=[], limit=10) - Search controls by keyword

  • Optional framework filtering
  • Full-text search across names and descriptions

get_framework_controls(framework) - Get all controls for a specific framework

  • Returns controls organized by domain

map_frameworks(source_framework, target_framework, source_control=None) - Map between frameworks

  • Bidirectional mapping via SCF
  • Optional filtering to specific source control

Purchased Standards Tools

list_available_standards() - List all available standards (SCF + imported)

query_standard(standard, query, limit=10) - Search within purchased standard

  • Requires import first
  • Returns clauses with page numbers

get_clause(standard, clause_id) - Get full text of specific clause

  • Requires import first

See PAID_STANDARDS_GUIDE.md for import instructions.

Add Purchased Standards (Optional)

Import your purchased ISO 27001, NIST SP 800-53, or other standards to get official text alongside SCF descriptions:

# Install import tools
pip install security-controls-mcp[import-tools]

# Import purchased PDF
scf-mcp-import import-standard \
  --file ~/Downloads/ISO-27001-2022.pdf \
  --type iso_27001_2022 \
  --title "ISO/IEC 27001:2022"

# Restart MCP, then query

Your paid content stays private in ~/.security-controls-mcp/ (never committed to git).

Full guide: PAID_STANDARDS_GUIDE.md

Technical Architecture

Data Pipeline: SCF JSON → In-memory index → MCP tools → AI response

Key principles:

  • All control text returns verbatim from SCF source with zero LLM paraphrasing
  • Framework mappings use ComplianceForge's authoritative crosswalks
  • Optional purchased standards stored locally (never committed)
  • Search results optimized for AI context windows

Data integrity:

  • SCF version locked to 2025.4 for consistency
  • All mappings sourced from official SCF framework crosswalks
  • User-imported standards require valid licenses

Data Source

Based on SCF 2025.4 (released December 29, 2025)

  • 1,451 controls across all domains
  • 261 frameworks with full mapping coverage
  • Licensed under Creative Commons (data)
  • Source: ComplianceForge SCF

Included data files:

  • scf-controls.json - All 1,451 controls with framework mappings
  • framework-to-scf.json - Reverse index for framework-to-SCF lookups

Related Projects

Part of Ansvar's Compliance Suite - MCP servers that work together for end-to-end compliance:

EU Regulations MCP - Query 47 EU regulations (GDPR, AI Act, DORA, NIS2, etc.)

US Regulations MCP - Query US federal and state compliance laws (HIPAA, CCPA, SOX, etc.)

OT Security MCP - Query IEC 62443, NIST 800-82/53, MITRE ATT&CK for ICS

Workflow Example

1. "What DORA requirements apply to ICT risk management?"
   → EU Regulations MCP returns Article 6 full text

2. "What security controls satisfy DORA Article 6?"
   → Security Controls MCP maps to ISO 27001, NIST CSF controls

3. "Show me ISO 27001 A.8.1 implementation details"
   → Security Controls MCP returns control requirements

Development

# Clone and install
git clone https://github.com/Ansvar-Systems/security-controls-mcp.git
cd security-controls-mcp
pip install -e '.[dev]'

# Install pre-commit hooks
pre-commit install

# Run tests
pytest tests/ -v

Pre-commit hooks run automatically before each commit:

  • Code formatting (black, ruff)
  • Linting (ruff check, YAML/JSON validation)
  • Tests (pytest, smoke tests, server startup)

Bypass hooks (emergencies only): git commit --no-verify

Important Disclaimers

Not Legal or Compliance Advice: Control text is sourced directly from official SCF data, but this tool should not be used as the sole basis for compliance decisions. Always verify against official framework sources and consult qualified compliance professionals.

AI Content Restrictions: The SCF license explicitly prohibits using AI systems to generate derivative content such as policies, standards, procedures, metrics, risks, or threats based on SCF data. You may query and analyze controls, but not generate derivative compliance artifacts.

Purchased Standards: Optional standards imports require valid licenses. You must own legitimate copies and comply with copyright restrictions. This tool does not include or distribute any copyrighted standards text.

Framework Coverage: While SCF provides comprehensive mappings, not all controls map 1:1 across frameworks. Always review official framework documentation for authoritative requirements.

License

Code: Apache License 2.0 (see LICENSE)

Data: Creative Commons Attribution-NoDerivatives 4.0 International (CC BY-ND 4.0) by ComplianceForge

What you MAY do:

  • Query and analyze SCF controls
  • Map between frameworks
  • Reference controls in your own work (with attribution)
  • Use this MCP server to understand control requirements

What you MAY NOT do:

  • Use AI to generate policies or procedures based on SCF controls
  • Create derivative frameworks or modified versions for distribution
  • Remove or modify control definitions

For complete terms: SCF Terms & Conditions


More Open Source from Ansvar

We maintain a family of MCP servers for compliance and security professionals:

Server Description Install
EU Regulations 47 EU regulations (GDPR, AI Act, DORA, NIS2, MiFID II, eIDAS, MDR...) npx @ansvar/eu-regulations-mcp
US Regulations HIPAA, CCPA, SOX, GLBA, FERPA, COPPA, FDA 21 CFR Part 11, state privacy laws npx @ansvar/us-regulations-mcp
OT Security IEC 62443, NIST 800-82, MITRE ATT&CK for ICS npx @ansvar/ot-security-mcp
Automotive UNECE R155/R156, ISO 21434 for automotive cybersecurity npx @ansvar/automotive-cybersecurity-mcp
Sanctions Offline sanctions screening with OpenSanctions (30+ lists) pip install ansvar-sanctions-mcp

Browse all projects: ansvar.eu/open-source


Built by: Ansvar Systems (Stockholm, Sweden)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

security_controls_mcp-0.4.0.tar.gz (781.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

security_controls_mcp-0.4.0-py3-none-any.whl (827.8 kB view details)

Uploaded Python 3

File details

Details for the file security_controls_mcp-0.4.0.tar.gz.

File metadata

  • Download URL: security_controls_mcp-0.4.0.tar.gz
  • Upload date:
  • Size: 781.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/2.3.1 CPython/3.14.2 Darwin/25.2.0

File hashes

Hashes for security_controls_mcp-0.4.0.tar.gz
Algorithm Hash digest
SHA256 485d3955449b0add912ea281851db95846c0e2e0113fdd7d2afb0ec0d4003233
MD5 ba72184fc01224c344d994ed3508557e
BLAKE2b-256 1dbdc5d687adcf1c717cb176dc555c674008ea609a650cd5529111b959ae5cf2

See more details on using hashes here.

File details

Details for the file security_controls_mcp-0.4.0-py3-none-any.whl.

File metadata

File hashes

Hashes for security_controls_mcp-0.4.0-py3-none-any.whl
Algorithm Hash digest
SHA256 749b6fc9a3800610cff5bc33462b57a4ba1a36f84d8b52d15614690703157d9c
MD5 e35a7098ebcfef3fd1d1b6f67aee796e
BLAKE2b-256 70b03ffa98d19331bd010d95fa138cbb18cf4b3ae2f81948231b1711b03755bc

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page