Blog
Recent
Cybersecurity

Model Context Protocol (MCP) Risk: How to Govern Credentials AI Agents Rely On

Shireen StephensonReviewed byMike KosakPublishedMay 15, 2026
What to know before you read

Via a connection protocol called Model Context Protocol (MCP), AI agents can connect to SaaS tools and perform actions on your behalf. While LastPass doesn’t manage MCP‑powered AI agents, it can govern human‑owned credentials such as static API keys and SSH keys that AI agents commonly rely on. These long-lived credentials remain a primary source of AI access risk. 

  • Every time an employee authorizes an AI tool with MCP integrations, it creates a machine identity that doesn't expire or show up in standard usage reports. And most SaaS security frameworks aren't built to see it. 
  • MCP launched in November 2024 with no authentication framework at all. In 2026, OAuth 2.1 and authentication are a strong spec recommendation for MCP, but no enforcement mechanism exists. 
  • 58% of SaaS logins occur outside SSO-managed environments. AI tools widen that gap, because employees can authorize them independently without informing IT. 
  • The access trail your auditors will ask for (which AI tools are active, what data they can touch, and how access is controlled) must be documented before the question gets asked, not after. 
  • LastPass helps lean IT teams at Professional Services firms close gaps at the credential layer, where both human and AI-connected logins occur, without needing a separate IAM platform. 

 

 

SaaS identity and access management was designed for human users. AI agents authenticate differently, using tokens, API keys, and certificates that often don't expire and carry persistent access. Ultimately, every AI tool with MCP integrations your team authorizes adds a machine identity your current controls weren't built to see.

Your consultants are using MCP-powered AI agents to work faster and more efficiently. And so are your accountants, engineers, and legal team.

You’re resigned to it, of course. But what keeps you up at night is what those agents can access.

The MCP (Model Context Protocol) standardizes how AI agents interface with the apps your business uses.

And if those apps grant the right API permissions, your agents can perform tasks like scan your Slack messages to find a shared PDF or generate custom summaries in Teams.

For productivity, that's a real gain. But for your access controls, it introduces a category of risk that wasn't part of the design when most SaaS security frameworks were written.

So, what does that risk look like for a Professional Services firm, and what can you do about it without rebuilding your security stack? 

What’s machine identity?

Before we get to MCP and the risks involved, let’s talk about machine identities. A machine identity is a non-human entity, like an AI agent, service account, or automated workflow that authenticates with tokens, API keys, or certificates instead of a username and password.  

So, when someone connects an MCP-powered AI agent to a SaaS app (like Slack), they grant that agent’s machine identity the scoped permissions needed to act on their behalf.

Historically,SaaS security has always treated identity as a human problem, but AI agents or machine identities break that model entirely. 

Via MCP, AI agents can retain long-lived access to your digital assets with credentials they are permitted to use. And what’s worrying is that this over-privileging of machine identities is the default for most AI integrations today.

Does MCP increase your SaaS app security risks?

The answer is yes. As mentioned, MCP standardizes how AI agents connect to your apps, which is a big win for productivity. But it also increases the risk of new access paths you can’t see. 

This is because each new MCP integration results in one or more credentials with persistent, multi-system access that most SaaS security tools can’t track.

From a SaaS app security standpoint, this creates three specific problems.

#1 Over-scoped permissions. When employees authorize tools with MCP integrations, they typically grant full read/write access because the authorization screen makes it the path of least resistance. So, the AI agent operates with full permissions indefinitely.

#2 Credential accumulation. AI agents operating via MCP can access multiple systems at a time. And each system connection requires its own credentials or tokens. As your team adds SaaS tools with MCP integrations, the number of active access tokens in your environment grows. 

#3 Visibility gaps. 58% of SaaS logins occur outside SSO-managed environments (Help Net Security). That’s for human users. AI agents widen that gap, because individual employees can authorize them without informing IT. Your access logs show what people are logging in to, but not where their credentials are being used by agents.

How does weak SaaS identity and access management (IAM) create audit exposure for Professional Services firms?

Weak SaaS IAM creates audit exposure because AI agents may use employee-authorized credentials to access client systems without clear revocation controls. 

If you can't show which AI-enabled tools are active, what access they hold, and how that access is controlled, you have a documented gap in your SOC 2, ISO 27001, or client contract obligations.

MCP was built for speed and convenience, not security. When Anthropic launched it in November 2024, there was no authentication framework at all. Anyone who could reach an MCP server could use it. 

By the time OAuth 2.0 auth arrived in March 2025 (refined to OAuth 2.1 in June 2025), the ecosystem had already exploded with thousands of MCP servers, all deployed with ZERO authentication baked in. 

In 2026, OAuth 2.1 and authentication are strong spec recommendations for MCP, but no enforcement mechanism exists. There’s no requirement to identify exactly who’s connecting to the MCP server. The same server also has no authorization controls, which means there are no rules about what an agent can do once it’s connected. 

With managed services like Composio, your AI agents get scoped sessions with your tokens or login permissions. They see only what you allow. However, developer-hosted MCP servers often use dev credentials, which gives 24/7 unchecked access to assets, with no session timeouts or monitoring.

As of March 2026, there are 3,012 unique servers in the official MCP registry, up from ~ 2,500 six months ago. But only 8.5% use OAuth. The rest (91.5%) rely on static API keys, personal access tokens, or no authentication at all. 

The risk can’t be emphasized enough: In Q1 2026, 42,000+ OpenClaw servers were exposed to the public internet, leaking API keys, Slack creds, and chat histories.

In a Professional Services context, a senior associate at your consultancy who connects an MCP-powered AI assistant to your client database automatically confers on the AI assistant the same high privileged access they enjoy.

If that tool is later compromised or if it’s an unvetted Shadow AI tool your IT team never approved, you have no audit trail to even begin an investigation with. 

The organizations with the strongest SaaS security posture are the ones treating AI agent credentials with the same rigor as employee credentials: provisioned with least privilege access, documented, and revocable on demand.

How does LastPass Business Max address AI-linked credential risk?

LastPass Business Max addresses the human credential layer where AI-enabled access begins. 

Essentially, LastPass governs human credentials, controls which apps they reach, and revokes access when an employee leaves. Those controls apply to AI agent activity by extension, because the agent is running on your team’s credentials *see note below*

Here’s what that looks like in practice:

  • SaaS Monitoring surfaces every app your team is logging in to via the browser. The discovery is automatic and organized by app, user, and risk indicators (credential health, risky logins, compliance).
  • SaaS Protect lets you set access rules at the app level: “Approve” for tools that have passed IT review, “Warn” for gray-zone apps, and “Block” for tools that pose a documented risk to data integrity and privacy compliance. 
  • LastPass reports produce the access trail your auditors require. So, when you’re asked how your firm governs AI tool usage, you have documented controls with evidence.

With LastPass, you have a credential governance layer that keeps access inside the boundaries you set.

If your firm doesn't have the headcount for an enterprise IAM deployment or the budget for an enterprise secrets manager like Hashi Corp, LastPass is a practical answer to MCP risks.

*A note on offboarding and AI access* 
When SaaS access is enforced through SSO, disabling an employee’s access also revokes agent access. But when AI tools rely on longlived API or SSH keys, revoking vault access prevents future use but doesn’t invalidate keys stored outside the vault. Rotation at the source system is required. LastPass governs the human credentials AI agents rely on, reducing exposure even when full machineidentity controls aren’t deployed.

What you need

How LastPass helps

Secure place for API keys & SSH keys

Encrypted Secure Notes inside your vault

Strong security without specialization

AES256 encryption, zeroknowledge design, MFA enforced at the vault level. No IAM expertise required

Predictable, affordable cost

~$9 per user/month, no persecret or usage fees

No infrastructure or DevOps overhead

SaaSbased; no vault infrastructure to manage

Fast time to value

Deploy in hours; zero integration required to start

Simple sharing & revocation

Centralized sharing, instant revocation when roles change or employees leave

Manual rotation is acceptable

Works well for manually rotated, longlived secrets

Read how Professional Services firms like EBC Financial Group are using LastPass to close their access control gaps and try it free today.

How does LastPass compare to other vendors for SaaS security?

LastPass doesn’t authenticate AI agents, issue OAuth tokens, or manage machine identities. But it governs the human-owned credentials those agents rely on, which is where most AI access risk originates today. 

See how LastPass compares with Dashlane Omnix and Zscaler below.

Dimension

LastPass Business Max

Dashlane Omnix

Zscaler

Primary purpose

Credential-layer SaaS & AI access governance

Browser-based credential & phishing protection

 

Network-level Zero Trust access

Visibility into Shadow SaaS/AI apps

Automatic discovery via browser usage (Discovered Apps)

Limited to credential risk detection and browser-side protection, not app-level governance

Can block an app at network level but zero visibility into weak or compromised credentials, the actual entry point for most breaches

 

App-level access controls

Allow / Warn / Block per app

Warn / interrupt flows only

Allow / block via network policies

 

Coverage of non-SSO logins

Strong; browser-based enforcement

Strong for credentials only

Weak unless traffic is routed through Zscaler

 

Audit readiness for AI tool usage

Built-in SaaS & access reporting

Event & risk reporting (credential-centric)

Requires correlation across tools

 

Deployment effort

-Low; SaaS visibility begins within minutes of deployment

 

-no specialized networking expertise required

 

Low, but focus is on credential threat lifecycle rather than SaaS governance

High; extensive network configuration and policy tuning required

Best fit buyer

Lean IT teams needing SaaS + AI governance

Teams focused on phishing & credential misuse

Large enterprises with existing Zero Trust stack

 

 

In summary:

  • Choose Dashlane Omnix if your primary goal is phishing resistance and browser-level credential safety
  • Choose Zscaler if you already run a full Zero Trust network architecture
  • Choose LastPass Business Max if your risk lives at the credential and SaaS layer, especially with AI tools authorized directly by employees

 

What should your professional services firm do right now to improve its SaaS security posture?

Getting ahead of the machine identity problem doesn't require rebuilding your security architecture but closing four specific gaps.

Step 1: Map your AI tool surface. Run a SaaS Discovery pass to see which AI tools are actively in use, not just the ones IT approved. SaaS Monitoring in LastPass Business Max does this automatically through the browser extension, with no agents required.

Step 2: Classify what you find. For each AI tool in active use, determine: Is this approved? Does it touch client data? Does it have appropriate credential governance? Tag tools by risk level, so you can apply the right controls.

Step 3: Apply app-level access rules. Use SaaS Protect to set allow, warn, or block policies for tools based on their classification. This gives you control without a blanket lockdown. Your employees keep their access to approved tools, while you get the visibility you need to protect your business.

Step 4: Enforce credential standards for high-risk apps. For apps that touch client data or feed into MCP-connected AI workflows, enforce FIDO2 MFA for your LastPass vault and set authentication policies that apply automatically. Don't rely on busy employees to maintain these standards independently.

Step 5: Build revocation into offboarding. When someone leaves your firm, their access should be revoked immediately. LastPass lifecycle management controls make this part of standard offboarding, not a separate step someone may forget.

If we disable an employee’s access, will AI agents still have access?

 
It depends on how access was granted. If access was enforced through SSO, disabling the employee revokes both human and agent access. But if the agent authenticated with static credentials (such as API keys or SSH keys), revoking access in LastPass prevents future use but doesn’t invalidate credentials already stored outside the vault. Rotating or disabling those credentials at the source system is required.

Sources

OWASP: MCP (Model Context Protocol) Security Cheat Sheet

OWASP CheatSheet – A Practical Guide for Securely Using Third-Party MCP Servers 1.0

DEV: 30 CVEs in 60 Days: MCP's Security Reckoning Is Here

Venture Beat: MCP stacks have a 92% exploit probability: How 10 plugins became enterprise security's biggest blind spot

Forbes: MCP, Agent Tool Access and the New Execution-Layer Security Gap

Nimble Brain: The state of MCP security in 2026

Nimble Brain: The state of MCP security March 2026

FAQs about MCP Risk and AI credential governance

When comparing LastPass with Dashlane Omnix, three (3) key differences emerge:

SaaS Monitoring: LastPass offers more comprehensive SaaS monitoring. Its greatest value lies in real-time discovery of SaaS and AI tools used in the browser, even if they aren’t saved in the vault. In contrast, Dashlane’s focus is on browser-based credential protection. There’s no documented equivalent to a LastPass-style Discovered Apps page with app-level states.

App Governance: LastPass excels in app governance by offering explicit Allow/Warn/Block capabilities to provide a seamless and proactive approach to managing app usage. Dashlane's controls are predominantly Warn/Interrupt/Confirm flows, with no hard block capabilities.

App-Centric Reporting: LastPass offers detailed, actionable reports on SaaS usage, credential health, and compliance. Dashlane’s analytics are strong but are built around credential-risk events, phishing events, domains, and user response.

Given these differences, LastPass is generally stronger in providing a comprehensive SaaS monitoring and app governance solution, while Dashlane focuses more on credential protection within the browser. 

LastPass Business Max deploys through the browser extension, the same one that handles password management. There's no agent to install on individual machines and no complex network configuration. 

SaaS Monitoring activates automatically once users are enrolled. Most organizations reach full SaaS app security visibility within days of rollout.

SSO covers known apps in your managed stack. Research shows that 58% of SaaS logins occur outside SSO-managed environments. 

AI tools are frequently authorized by employees outside IT-managed flows, which means they fall into that ungoverned segment. 

LastPass Business Max closes that gap by monitoring and controlling access at the browser level, where both SSO and non-SSO logins occur.

LastPass holds SOC 2 Type II, SOC 3, ISO 27001, ISO 27701, BSI C5, and TRUSTe Privacy certifications. 

These cover the identity and credential governance components most referenced in Professional Services client contracts, privacy frameworks, and audit standards including NIST and HIPAA.

That’s a fair question. Many teams start with password management but quickly outgrow it. As SaaS and Gen AI become ever more entrenched in modern workflows, password management alone can’t give you the visibility you need

LastPass is designed for the scenario where access risk is growing, but enterprise IAM would be too complex (and costly) to deploy.

Share this post via:share on linkedinshare on xshare on facebooksend an email