ACAI
ProductEvidenceDocsPricing
ACAI

Continuous compliance for AI. Every call scanned, classified, audit-logged, and evidence-ready.

Product

  • AI Layer
  • Sample Reports
  • Pricing
  • Documentation
  • Quickstart
  • Start Free

Company

  • About
  • Talk to an Engineer
  • Security
  • Support

Legal

  • Privacy Policy
  • Terms of Service
Service-Disabled Veteran-Owned Small Business
© 2026 Agile Cloud & AI LLC. All rights reserved.
Live — Private Beta

Compliance proxy for MCP servers — now available for regulated teams.

Talk to an Engineer
MCP Compliance Proxy

The Compliance Layer for MCP.

Every tool call to your MCP servers passes through ACAI's compliance pipeline — PII detection, data classification enforcement, tool authorization, and tamper-proof audit logging. Register your servers, apply a policy, and hand your auditor a report.

Talk to an EngineerExplore AI Layer
agilecloud.ai/dashboard/mcp-servers
MCP Proxy Audit
5 tool calls
PHIConfidentialInternalPublic
read_patient_recordehr-serverPHI
3 redacted
query_databaseanalytics-mcpConfidential
1 redacted
search_documentsdoc-serverInternal
—
delete_recordsehr-serverPHI
—
get_weatherutility-mcpPublic
—
JSON-RPC 2.0 · SSE streaming · Per-server circuit breakersExport
agilecloud.ai/dashboard/mcp-servers
MCP Proxy Audit
5 tool calls
PHIConfidentialInternalPublic
read_patient_recordehr-serverPHI
3 redacted
query_databaseanalytics-mcpConfidential
1 redacted
search_documentsdoc-serverInternal
—
delete_recordsehr-serverPHI
—
get_weatherutility-mcpPublic
—
JSON-RPC 2.0 · SSE streaming · Per-server circuit breakersExport
HIPAASOC 2PCI DSSGDPRCCPANIST 800-53FERPA
JSON-RPC 2.0 compliant·SSE streaming support·4 data classification levels·14+ PII patterns

Your AI Agents Are Calling Tools. Where's the Audit Trail?

MCP servers let AI agents query databases, read patient records, search documents, and execute commands. When the auditor asks which tools were called, what data was accessed, and whether PII was exposed — you need answers in seconds, not a forensic investigation.

The MCP Layer intercepts every tool call, enforces your compliance policy, and generates the evidence. Same MCP protocol, same servers — compliance built in.

Register. Policy. Proxy. Evidence.

Four steps. Every tool call. Automatic.

Step 01

Register

Register your MCP servers — name, URL, auth method, and maximum data classification level. One dashboard, all your servers.

Step 02

Apply Policy

Pick a compliance template (HIPAA, SOC 2, PCI DSS, etc.) or build a custom policy. Set tool allow/block lists and classification ceilings.

Step 03

Proxy Traffic

Point your MCP client at the ACAI MCP endpoint. Every JSON-RPC request is intercepted — PII scanned, classification enforced, tools authorized — then forwarded to your server.

Step 04

Get Evidence

Audit trail fills automatically. Generate framework-mapped compliance reports covering tool authorization, PII handling, and classification enforcement. Hand your auditor a report.

Built for Regulated MCP

Everything you need to make MCP tool calls compliant — without changing your servers.

PII Scanning on Tool Calls

Every tool parameter and response passes through PII detection before reaching your MCP server — and again before results reach the client. 14+ PII patterns plus NER-based entity recognition.

Tool Allow / Block Lists

Whitelist approved tools or block dangerous ones per-server. Policy enforcement happens at the proxy layer — your MCP server never sees unauthorized requests.

Data Classification Enforcement

Four classification levels — Public, Internal, Confidential, PHI. Set a maximum classification per server. Tool calls that exceed the server's classification ceiling are rejected before they leave the proxy.

Tamper-Proof Audit Trail

Every JSON-RPC request logged with tool name, parameters (redacted), response summary, classification level, PII findings, and latency. Immutable records with correlation IDs.

Compliance Reports

One-click evidence exports for HIPAA, SOC 2, PCI DSS, GDPR, CCPA, NIST 800-53, and FERPA. Reports cover tool authorization, PII handling, classification enforcement, and complete request logs.

Per-Server Circuit Breakers

Automatic circuit breaking on failing MCP servers. Configurable thresholds, half-open recovery, and health checks. Your compliance proxy stays up even when backends don't.

Protocol-Level Compliance

The MCP Layer speaks native MCP — no SDK changes, no client modifications.

SSE Streaming

Full Server-Sent Events support. Tool responses stream through the compliance layer in real time — no buffering, no added latency on streamed responses.

JSON-RPC 2.0

Native JSON-RPC 2.0 at the wire level. Request IDs, error codes, batch requests — all preserved. Your MCP client doesn't know the proxy exists.

Circuit Breakers

Per-server circuit breakers with configurable failure thresholds. Half-open recovery probes. Your proxy stays healthy even when backends are down.

Auth Passthrough

Bearer tokens, API keys, or no auth — the MCP Layer handles authentication to your MCP servers. Secrets stored encrypted (AES-256-GCM) in the backend.

Classification Ceilings

Set a max data classification per server. A server marked 'Internal' rejects tool calls carrying Confidential or PHI data — before the request leaves the proxy.

Tool Governance

Allow-list and block-list tools per server. Only approved tools get proxied. Blocked tools return a policy violation — logged, audited, reported.

Ready to make MCP compliant?

Talk to an engineer about your MCP compliance requirements — or explore the AI Layer for AI inference compliance.

Talk to an EngineerExplore AI Layer