4,000+ servers built on MCP Fusion
Vinkius

Integrate Drata with Claude, Cursor, Chatbots & AI Agents MCP Server

Automate compliance and security via Drata — monitor controls, track personnel onboarding, audit policies, and verify cloud asset security directly from any AI agent.
MCP Inspector GDPR Free for Subscribers

Compatible with every major AI agent and IDE

ClaudeClaude
ChatGPTChatGPT
CursorCursor
GeminiGemini
WindsurfWindsurf
VS CodeVS Code
JetBrainsJetBrains
VercelVercel
+ other MCP clients
drata

Drata get control on Drata

Returns passing/failing status, which automated tests provide evidence for this control, the explicit auditor language defining the risk logic, and any manual evidence uploads. Use to investigate why a control is failing, what evidence supports it, or to prepare for auditor questions about a specific requirement. Get detailed status of a specific Drata control — pass/fail state, automated test evidence, and auditor-facing risk language

drata

Drata get person on Drata

Returns MDM (Jamf/Intune) enrollment status, background check clearance date, onboarding milestone completion, linked IdP (Okta/Google Workspace) groups for access control mapping, security training completion date, and any compliance gaps. Use when investigating a specific employee compliance issue. Get the compliance onboarding state of a specific employee — MDM enrollment, background checks, IdP grouping, and training milestones

drata

Drata get policy on Drata

Essential for assessing audit readiness regarding mandatory annual document refreshes. Get detailed status of a specific Drata policy — renewal dates, employee acknowledgment rates, owner assignment, and version history

drata

Drata list assets on Drata

Each asset shows: resource type, resource ID, compliance status against linked controls, encryption-at-rest verification, network boundary adherence, and associated region/VPC. Use when the user asks about infrastructure compliance, unencrypted resources, or needs an asset inventory for audit evidence. List cloud infrastructure assets monitored by Drata — EC2 instances, RDS databases, S3 buckets, and other resources with compliance status

drata

Drata list controls on Drata

Each control represents a specific requirement (e.g., "Passwords must be 12+ characters", "MFA enabled for all users", "Encryption at rest required"). Returns control name, description, passing/failing status, mapped framework(s), linked tests, and control owner. Use when the user asks about compliance posture, failing controls, or audit gap analysis. List all compliance controls in Drata — the discrete technical and administrative requirements mapped to SOC 2, ISO 27001, HIPAA, and GDPR frameworks

drata

Drata list frameworks on Drata

Each framework shows: name, version, overall readiness score, percentage of controls passing, number of controls mapped, and target audit date. Provides a high-level view of multi-framework compliance posture. Use for board-level reporting, audit planning, or determining which framework needs the most attention. List active compliance frameworks tracked by the Drata workspace — SOC 2 Type II, ISO 27001, HIPAA, GDPR, PCI DSS — with readiness scores

drata

Drata list personnel on Drata

Each person includes: name, email, role, employment type, Security Awareness Training status (completed/overdue/not started), device compliance (MDM enrolled, encrypted, antivirus), background check clearance, and policy acceptance rates. Use for "who is non-compliant?", "which employees have overdue training?", or pre-audit personnel reporting. List all tracked personnel in Drata with security training status, device compliance, background check clearance, and policy acceptance

drata

Drata list policies on Drata

Each policy includes: name, category, CISO approval status, version number, last review date, next review due, and employee acknowledgment completion rate. Policies are mandatory for SOC 2 / ISO 27001. Use when the user asks about policy status, which policies need review, or audit readiness regarding documentation. List all security and compliance policies in Drata — Information Security, Data Classification, Incident Response, Acceptable Use, and more

drata

Drata list tests on Drata

Each test monitors a specific technical requirement in real-time (e.g., "S3 Buckets must not be public", "GitHub branch protection enabled", "MFA enforced in Okta"). Shows test name, associated control, pass/fail status, last evaluation time, and failing resources if any. Use when the user asks about automated monitoring, which checks are failing, or real-time compliance status. List Drata automated continuous compliance tests — real-time monitors checking AWS, GitHub, Okta, and other integrations for security deviations

drata

Drata list vendors on Drata

Each vendor includes: company name, data risk classification (Critical/High/Medium/Low), security questionnaire completion status, SOC 2 report review status, last assessment date, data categories shared, and assigned risk owner. Use for vendor risk assessment, subprocessor audits, or evaluating the security posture of your supply chain. List third-party vendors in Drata vendor risk management — risk classification, security questionnaire status, and SOC 2 report reviews

Security & Code Integrity Audit

Every tool in the Drata MCP Server is continuously audited by the Vinkius Security Engine. We guarantee zero-trust payload isolation, strict data boundaries, and deterministic execution for enterprise-grade AI agents.

MCP Inspector
A+Score: 100

How Vinkius protects your data

Is there a risk of the AI "going crazy" and deleting important company data?

No. With Vinkius, the AI operates on "rails". It can only make the exact moves you authorized in the tool's settings. It cannot invent routes, access other networks in your company, or decide to delete random files. If the action isn't in the approved catalog, the attempt is blocked instantly.

What happens if the underlying API rate limits my agent?

Our edge infrastructure automatically handles backoffs, queueing, and throttling. If an AI agent sends too many erratic requests, Vinkius manages the rate limits gracefully, ensuring your backend doesn't crash.

Does the AI train on my tools or API data?

No. Vinkius enforces a strict Zero-Retention policy. Your data simply passes through our secure servers to complete the requested action and is instantly forgotten. Nothing you do here is ever stored, logged, or used to train any artificial intelligence.

Can my agent check if specific employees have finished their security training?

Yes. Use the 'list_personnel' or 'get_personnel_status' tools. The agent retrieves the onboarding state, including Security Awareness Training completion and background check clearance for any tracked individual.

What can AI Agents do with Drata?

The Drata integration provides structured, LLM-friendly schemas for reliable tool execution within your agentic workflows.

Cursor Copilot for compliance automation

The Drata toolkit provides structured tools for compliance automation. It enables conversational interfaces like Claude Code to query and modify data within your fort knox infrastructure.

Autonomous security audits via AI

The Drata integration allows Cursor and ChatGPT to securely fetch security audits data. It handles the API requests required for fort knox operations.

Explore More MCP Servers

View all →