This guide outlines security best practices for configuring and using Model Context Protocol (MCP) servers with Kiro, helping you protect sensitive information and maintain system security.
MCP servers extend Kiro's capabilities by connecting to external services and APIs. This introduces potential security considerations that should be addressed:
Restrict access to your MCP configuration files:
# Set restrictive permissions on user-level config chmod 600 ~/.kiro/settings/mcp.json # Set restrictive permissions on workspace-level config chmod 600 .kiro/settings/mcp.json
Only auto-approve tools that:
{ "mcpServers": { "aws-docs": { "autoApprove": [ "mcp_aws_docs_search_documentation", "mcp_aws_docs_read_documentation" ] } } }
The AWS Documentation server is generally safe as it:
When using the GitHub MCP server:
When creating or using custom MCP servers:
Use workspace-level configurations for project-specific MCP servers:
project-a/ ├── .kiro/ │ └── settings/ │ └── mcp.json # Project A specific servers project-b/ ├── .kiro/ │ └── settings/ │ └── mcp.json # Project B specific servers
This ensures that:
Regularly review MCP logs to monitor server activity:
Periodically review which tools you've approved:
If you suspect a security issue with an MCP server:
For information on configuring MCP servers, see the MCP Configuration page.
Best Practices