DEV Community

t49qnsx7qt-kpanks
t49qnsx7qt-kpanks

Posted on

cloudflare's enterprise mcp architecture — and the compliance gap it doesn't mention

cloudflare's enterprise mcp architecture — and the compliance gap it doesn't mention

cloudflare dropped their enterprise MCP architecture post today (may 11). it's worth reading in full, but here's the technical summary:

  • remote MCP servers running behind Cloudflare Access OAuth — SSO and MFA enforced at the gateway
  • AI Gateway sits between the agent and the LLM, applying per-employee token limits and observability
  • centralized policy enforcement with DLP guardrails
  • shadow MCP detection via hostname pattern matching and JSON-RPC method inspection
  • consistent audit logging across all MCP server connections

this is real enterprise infrastructure. the shadow MCP detection in particular — scanning for unexpected hostname patterns and JSON-RPC method signatures — is something most security teams hadn't thought through. you can have a fully governed MCP stack and still have a developer spinning up a rogue MCP server on a personal AWS account that your IAM policies don't cover.

what the architecture handles

cloudflare's stack solves the access control problem. you get:

  • who can connect to which MCP servers (OAuth + SSO)
  • what those connections look like in aggregate (AI Gateway observability)
  • token and cost controls per identity
  • detection of MCP connections that shouldn't exist

that's solid. it's the kind of infrastructure a security team can own and operate.

what it doesn't handle

audit logging and compliance documentation are not the same thing.

the cloudflare architecture produces logs: which agent connected, which tool was called, how many tokens were consumed, whether the request triggered a DLP flag. that's the infrastructure record.

what enterprise compliance teams are being asked to produce right now — especially for EU AI Act high-risk system registration by august 2 — is a structured document: what was the model, what decision did it make, was that decision within the declared authorization scope, and is there a tamper-evident chain of custody from input to output.

DLP logs don't answer those questions. gateway observability doesn't answer those questions. they give you the raw material, but the translation from "infrastructure log" to "compliance documentation" is still manual.

the pattern

this is now the third tier-1 infrastructure announcement this week covering enterprise MCP governance: AWS MCP Server GA on May 6 (CloudTrail integration), ServiceNow Action Fabric on May 5 (AI Control Tower), and now Cloudflare's enterprise MCP post. all three do the same thing: they solve the access and observability layer. none of them produce compliance documentation.

that's not a criticism — it's the right separation of concerns. cloudflare should own the network layer. but the compliance layer above it has to come from somewhere, and "ask the compliance team to read the gateway logs" isn't a repeatable process at enterprise scale.

closing the last mile

BizSuite AI-Audit takes the infrastructure output — cloudflare gateway logs, CloudTrail, whatever the MCP server produces — and generates structured compliance documentation in 48 hours, $997 flat. decision-trace format, model identification, authorization scope, audit trail structured for EU AI Act Article 12 review.

if you're deploying enterprise MCP on cloudflare's architecture, the access control layer is handled. the compliance report isn't. 83 days to the august 2 deadline: https://getbizsuite.com/ai-audit

Top comments (0)