Skip to content

Compliance

This page captures the compliance posture Aurora MCP inherits from the wider Consilio platform, plus the MCP-specific controls a procurement team will want to confirm.

Aurora MCP runs inside the same hosting environment as the Consilio portal and eDiscovery platform. It inherits the parent platform’s certifications and third-party attestations, including:

  • SOC 2 Type II — annual report, available under NDA.
  • ISO/IEC 27001 — Information Security Management System.
  • HIPAA — Business Associate Agreements available where applicable.
  • GDPR — EU data handling, DPA available.

For copies of the current reports and attestations, contact your Consilio account team.

On top of the inherited posture, Aurora MCP adds:

ControlDetail
Auth protocolOAuth 2.1 with PKCE (S256), RFC 8707 Resource Indicators, RFC 9728 Protected Resource Metadata
Identity providerConsilioId (Duende IdentityServer Enterprise)
Token validationEnvoy Gateway (audience, scope, signature) — token never reaches the MCP server
Network isolationKubernetes NetworkPolicy — only gateway data-plane pods can reach the MCP server
Tool postureRead-only; no write/update/delete tools exist
Prompt retentionNone
Tool-output retentionNone
Operational loggingTool name, latency, status, caller sub — short retention, used for abuse detection

Using Aurora MCP doesn’t alter your data-processing agreement with Consilio, and it doesn’t alter your separate terms with your AI assistant provider. Data that leaves the MCP server to answer a prompt is subject to the processing terms of your chosen assistant’s plan.

For due-diligence questionnaires, SIG/CAIQ responses, or architecture deep-dives, email security@consilio.com with your organisation name and timeline.