Bring Compliance Automation
to Google ADK
Create your Vinkius account to connect Drata to Google ADK and start using all 10 AI tools in minutes. Fully managed, enterprise secure, and ready to use without writing a single line of code. No hosting, no server setup — just connect and start using.
Compatible with every major AI agent and IDE
What is the Drata MCP Server?
Connect your Drata account to any AI agent and take full control of your continuous compliance and automated security monitoring through natural conversation.
What you can do
- Compliance Control Oversight — List internal compliance controls and fetch exact evaluation states to see if technical or administrative requirements are passing or failing
- Personnel Compliance Tracking — Monitor employee and contractor directories to identify missing security training, background checks, or policy acknowledgments
- Security Policy Auditing — Retrieve the overarching InfoSec documentation and extract renewal dates and completion rates to assess audit readiness
- Automated Test Monitoring — Detail which technical monitors across AWS, GCP, or Azure are triggering compliance deviations in real-time
- Framework Readiness — Track active compliance frameworks (SOC 2, ISO 27001, HIPAA) and get overall readiness scores and control completion percentages
- Vendor Risk Management — Returns the vendor risk inventory to track security questionnaires and data risk classifications for third-party subprocessors
- Cloud Asset Verification — Insight into how EC2, RDS, and other infrastructure nodes align against underlying compliance controls
How it works
- Subscribe to this server
- Enter your Drata Public API Key (found in your Drata Dashboard under Settings > API Keys)
- Start managing your compliance workflows from Claude, Cursor, or any MCP-compatible client
Who is this for?
- Compliance Officers & CISOs — audit control statuses and policy readiness without manual dashboard navigation
- HR & Ops Teams — monitor personnel onboarding milestones and background check clearances using natural language
- Security Engineers — verify cloud asset alignment and monitor automated test failures in real-time
- Developers — test and debug continuous compliance integrations through natural conversation
Built-in capabilities (10)
Returns passing/failing status, which automated tests provide evidence for this control, the explicit auditor language defining the risk logic, and any manual evidence uploads. Use to investigate why a control is failing, what evidence supports it, or to prepare for auditor questions about a specific requirement. Get detailed status of a specific Drata control — pass/fail state, automated test evidence, and auditor-facing risk language
Returns MDM (Jamf/Intune) enrollment status, background check clearance date, onboarding milestone completion, linked IdP (Okta/Google Workspace) groups for access control mapping, security training completion date, and any compliance gaps. Use when investigating a specific employee compliance issue. Get the compliance onboarding state of a specific employee — MDM enrollment, background checks, IdP grouping, and training milestones
Essential for assessing audit readiness regarding mandatory annual document refreshes. Get detailed status of a specific Drata policy — renewal dates, employee acknowledgment rates, owner assignment, and version history
Each asset shows: resource type, resource ID, compliance status against linked controls, encryption-at-rest verification, network boundary adherence, and associated region/VPC. Use when the user asks about infrastructure compliance, unencrypted resources, or needs an asset inventory for audit evidence. List cloud infrastructure assets monitored by Drata — EC2 instances, RDS databases, S3 buckets, and other resources with compliance status
Each control represents a specific requirement (e.g., "Passwords must be 12+ characters", "MFA enabled for all users", "Encryption at rest required"). Returns control name, description, passing/failing status, mapped framework(s), linked tests, and control owner. Use when the user asks about compliance posture, failing controls, or audit gap analysis. List all compliance controls in Drata — the discrete technical and administrative requirements mapped to SOC 2, ISO 27001, HIPAA, and GDPR frameworks
Each framework shows: name, version, overall readiness score, percentage of controls passing, number of controls mapped, and target audit date. Provides a high-level view of multi-framework compliance posture. Use for board-level reporting, audit planning, or determining which framework needs the most attention. List active compliance frameworks tracked by the Drata workspace — SOC 2 Type II, ISO 27001, HIPAA, GDPR, PCI DSS — with readiness scores
Each person includes: name, email, role, employment type, Security Awareness Training status (completed/overdue/not started), device compliance (MDM enrolled, encrypted, antivirus), background check clearance, and policy acceptance rates. Use for "who is non-compliant?", "which employees have overdue training?", or pre-audit personnel reporting. List all tracked personnel in Drata with security training status, device compliance, background check clearance, and policy acceptance
Each policy includes: name, category, CISO approval status, version number, last review date, next review due, and employee acknowledgment completion rate. Policies are mandatory for SOC 2 / ISO 27001. Use when the user asks about policy status, which policies need review, or audit readiness regarding documentation. List all security and compliance policies in Drata — Information Security, Data Classification, Incident Response, Acceptable Use, and more
Each test monitors a specific technical requirement in real-time (e.g., "S3 Buckets must not be public", "GitHub branch protection enabled", "MFA enforced in Okta"). Shows test name, associated control, pass/fail status, last evaluation time, and failing resources if any. Use when the user asks about automated monitoring, which checks are failing, or real-time compliance status. List Drata automated continuous compliance tests — real-time monitors checking AWS, GitHub, Okta, and other integrations for security deviations
Each vendor includes: company name, data risk classification (Critical/High/Medium/Low), security questionnaire completion status, SOC 2 report review status, last assessment date, data categories shared, and assigned risk owner. Use for vendor risk assessment, subprocessor audits, or evaluating the security posture of your supply chain. List third-party vendors in Drata vendor risk management — risk classification, security questionnaire status, and SOC 2 report reviews
Why Google ADK?
Google ADK natively supports Drata as an MCP tool provider. declare Vinkius Edge URL and the framework handles discovery, validation, and execution automatically. Combine 10 tools with Gemini's long-context reasoning for complex multi-tool workflows, with production-ready session management and evaluation built in.
- —
Google ADK natively supports MCP tool servers. declare a tool provider and the framework handles discovery, validation, and execution
- —
Built on Gemini models, ADK provides long-context reasoning ideal for complex multi-tool workflows with Drata
- —
Production-ready features like session management, evaluation, and deployment come built-in. not bolted on
- —
Seamless integration with Google Cloud services means you can combine Drata tools with BigQuery, Vertex AI, and Cloud Functions
Drata in Google ADK
Why run Drata with Vinkius?
The Drata connection runs on our fully managed, secure cloud infrastructure. We handle the hosting, maintenance, and security so you don't have to deal with servers or code. All 10 tools are ready to work instantly without any complex setup.
You stay in complete control of your data. Your AI only accesses the information you approve, keeping your sensitive passwords and private details completely safe. Plus, with automatic optimizations, your AI works faster and more efficiently.

* Every connection is hosted and maintained by Vinkius. We handle the security, updates, and infrastructure so you don't have to write code or manage servers. See our infrastructure
Over 4,000 integrations ready for AI agents
Explore a vast library of pre-built integrations, optimized and ready to deploy.
Connect securely in under 30 seconds
Generate tokens to authenticate and link external services in a single step.
Complete visibility into every agent action
Audit live requests, latency, success rates, and active security compliance policies.
Optimize spending and track token ROI
Analyze real-time token consumption and cost metrics detailed by connection.




Explore our live AI Agents Analytics dashboard to see it all working
This dashboard is included when you connect Drata using Vinkius. You will never be left in the dark about what your AI agents are doing with your tools.
Drata and 4,000+ other AI tools. No hosting, no code, ready to use.
Professionals who connect Drata to Google ADK through Vinkius don't need to write code, manage servers, or worry about security. Everything is pre-configured, secure, and runs automatically in the background.
Raw MCP | Vinkius | |
|---|---|---|
| Ready-to-use MCPs | Find and configure each manually | 4,000+ MCPs ready to use |
| Connection Setup | Manual coding & server setup | 1-click instant connection |
| Server Hosting | You host it yourself (needs 24/7 uptime) | 100% hosted & managed by Vinkius |
| Security & Privacy | Stored in plaintext config files | Bank-grade encrypted vault |
| Activity Visibility | Blind execution (no logs or tracking) | Live dashboard with real-time logs |
| Cost Control | Runaway AI token spend risk | Automatic budget limits |
| Revoking Access | Must delete files or code to stop | 1-click disconnect button |
How Vinkius secures
Drata for Google ADK
Every request between Google ADK and Drata is protected by our secure gateway. We automatically keep your sensitive data private, prevent unauthorized access, and let you disconnect instantly at any time.
Frequently asked questions
Can my agent check if specific employees have finished their security training?
Yes. Use the 'list_personnel' or 'get_personnel_status' tools. The agent retrieves the onboarding state, including Security Awareness Training completion and background check clearance for any tracked individual.
How do I monitor which compliance controls are currently failing?
Use the 'list_controls' tool to see all controls and 'get_control' for specific details. The agent will fetch exact evaluation states and automated test results to identify failing requirements and their risk logic.
Can I see my SOC 2 readiness score through natural conversation?
Absolutely. Use the 'list_frameworks' tool. Your agent will pull the top-level standard boundaries and provide overall readiness scores and aggregated control completion percentages for frameworks like SOC 2.
How does Google ADK connect to MCP servers?
Import the MCP toolset class and pass the server URL. ADK discovers and registers all tools automatically, making them available to your agent's tool-use loop.
Can ADK agents use multiple MCP servers?
Yes. Declare multiple MCP tool providers in your agent configuration. ADK merges all tool schemas and the agent can call tools from any server in a single turn.
Which Gemini models work best with MCP tools?
Gemini 2.0 Flash and Pro models both support function calling required for MCP tools. Flash is recommended for latency-sensitive use cases, Pro for complex reasoning.
McpToolset not found
Update: pip install --upgrade google-adk
Explore More MCP Servers
View all →
Intelligent Loan Comparator
4 toolsEmpower your AI Agent with deterministic financial modeling. Instantly compare loan options and calculate exact amortization schedules offline, guaranteeing precision and privacy.

Enrich CRM
5 toolsEnhance your CRM records with verified company data, technographic signals, and contact enrichment that keeps your database fresh.

Snov.io
10 toolsFind business emails, verify deliverability, and run multi-step drip campaigns that fill your outbound sales pipeline.

NVIDIA Audio
10 toolsTranscribe speech, generate voices, translate audio, and clone voices via NVIDIA Audio APIs.
