Production MCP deployments in 2026 require security controls far beyond basic OAuth tokens. The Security Working Group has defined standards for:
Every MCP interaction should be logged with:
| Field | Purpose |
|---|---|
| Timestamp | When the action occurred |
| Client ID | Which user/agent made the request |
| Server ID | Which MCP server handled it |
| Tool Called | Exact tool name and arguments |
| Result | Success/failure + truncated response |
| Token Count | Tokens consumed for billing |
Instead of granting an MCP server blanket access, users can grant incremental permissions:
read:calendarwrite:calendarEach scope is granted individually, never all-or-nothing.
Remote MCP servers publish a /.well-known/mcp JSON manifest describing their name, version, auth requirements, and endpoint URL. Clients can discover capabilities before establishing a connection.