Security Considerations
To ensure secure usage of the Database Tools MCP Server, follow these best practices:
Network Security
- Access MCP Server endpoints only over HTTPS.
- Ensure MCP clients can securely reach MCP Server and IAM OAuth endpoints.
- When using private databases, configure network security groups and private endpoints to restrict access to trusted sources.
Credential and Secret Management
- Store database credentials securely using OCI Vault when using password-based authentication.
- Use resource principals or token-based authentication where possible to avoid managing long-lived credentials.
- Do not embed credentials directly in client configurations or code.
Token and Session Management
- Use short-lived OAuth access tokens to reduce exposure risk.
- Configure appropriate token expiration durations based on usage patterns.
- Reauthenticate users when tokens expire or are invalid.
Least Privilege Access
- Assign IAM application roles (such as MCP_User, MCP_Operator) based on user responsibilities.
- Restrict access to MCP Toolsets and SQL Reports using role-based controls.
- Limit database user privileges to only the operations required by MCP Tools.
Tool and SQL Execution
- Prefer predefined and parameterized SQL (custom tools and SQL reports) over unrestricted ad-hoc SQL execution.
- Validate and review SQL and PL/SQL scripts used in MCP Toolsets to prevent unintended data access or modification.
- Clearly define Tool descriptions and parameters to guide correct usage by MCP clients and LLMs.