No items found.

From Talk to Action: The Fastest, Most Secure Way to Build MCP Servers on AWS Marketplace for Free

Published On
November 6, 2025

Access BlueRock Secure MCP Server on AWS Marketplace: [link]

Introduction

Actions leak louder than words. With the rise of agentic workflows and MCP, AI doesn’t just talk, it takes action. That dramatically alters where risk shows up.  It’s no longer limited to the prompt.  It’s in the execution layer where tools run, processes launch, files are read, and data moves.

Today we’re making it radically easier to secure agentic actions. 

BlueRock’s Secure MCP Server is now available on AWS Marketplace for free.  The Amazon Machine Image (AMI) is built on top of Amazon Linux 2023, with FastMCP and BlueRock built-into the distribution. This delivers a secure by default foundation for MCP servers, while leveraging all the fast-to-market benefits of FastMCP with the built-in security from BlueRock. The combination of these capabilities provides  built-in visibility and alerts to build quickly while  defending against agentic exploits and controlling MCP tool execution. 

Access BlueRock Secure MCP Server on AWS Marketplace: [link]

Why this matters now

We’ve hit an inflection point. Generation 1 AI made chat great. Generation 2 AI connects LLMs to autonomous agents, powerful tools and production data. With the promise of driving exponential scale and efficiency, enterprises are moving at breakneck speed to deploy agentic AI.  But there’s a problem.  Agentic AI is insecure by default:

  • No Visibility.  You can’t secure what you can’t see.  An agentic fabric is a dynamic collection of non-deterministic LLMs, autonomous client agents, powerful tools and MCP servers with access to critical data services.  Understanding what’s connecting to what, what tools are being used, what data is being accessed by who or what is more than half that battle.
  • Agentic clients are unpredictable. There’s no such thing as a “secure prompt.” Even well-meaning inputs can trigger unsafe behavior, giving access to local secrets, risky tool usage, or arbitrary code execution.
  • Agentic tools and servers assume trust. MCP dynamically advertises “tools” that, deployed without guardrails, are functionally privilege escalation methods that grant access to critical data. Furthermore, AuthN/Z patterns are still immature resulting in excessive data access for agentic entities.

In addition, the most recent data from Github indicates that over 22,000 net new MCP repos have been created in the last month – one every 30 hours. We are, by definition, living in the wild, wild west.

While these security challenges are simple to understand, the solution is much more complex.  We need to see and govern actions, not just monitor prompts.  Prompt filtering creates  ever-escalating AI warfare between filtering heuristics and novel bypass techniques.  The solution is to control the action and interactions of agentic operations. By controlling the execution, you can better control the risk. 

Built-in, not bolt-on

At BlueRock we took a different path: security that moves with the workload and sees the world from the runtime itself.

  • No bolt-on agents. No complex rule writing.

  • Zero-tuning defaults that deliver value in minutes.

  • Simple, invariant policies that cover broad classes of attacks, so you’re not chasing every new exploit.

In practice, a small set of policies can block the high-signal weaponization tactics attackers rely on across many threat vectors. It’s a faster, cleaner way to create a secure-by-default baseline.

What’s in BlueRock Free Secure MCP Server

The fastest and easiest way to secure FastMCP.  The Free Tier provides real-time visibility & alerting to protect the runtime integrity of FastMCP servers.  It includes:

  • BlueRock Amazon Linux 2023 (pre-hardened base image)
  • Fast MCP Pythonic Framework
  • Sample FastMCP-based server

Five simple, high-impact policies (on by default, zero tuning) protect entire classes of both known and unknown agentic AI attacks, including 70% of the CISA KEV.

  1. Python and Java Application Runtime Guardrails
    Detects and prevents exploits via deserialization, SSRF, path traversal, and other code-level exploits. Provides capabilities for full MCP protocol inspection and blocking.

  2. Config Drift Detection
    Identify tool, tool argument and other control modifications on an MCP server.

  3. Reverse shell protection
    Kills post-exploitation command-and-control via spawned shells/remote TTY.

  4. Container drift protection
    Prevents execution of binaries not in the original image—classic malware drop behavior.

  5. Capability escalation control
    Blocks attempts to add elevated Linux capabilities and expand blast radius.

  6. Host namespace escape prevention
    Stops container breakouts to host namespaces.

Why it works: these policies are exploit-agnostic and target the tactics common to many exploits. They’re designed to cover entire classes of attack chains, addressing a large share of real-world techniques with near-zero overhead.

The free tier provides visibility and alerts in an observability mode and sends events into AWS CloudWatch or alternative OTEL collectors. Paid tiers add enforcement (block mode) and customized policy controls.

Get started in minutes

  1. Launch the BlueRock Amazon Linux 2023 AMI.
  2. Build custom tools on top of the FastMCP Framework or deploy the Anthropic Weather Forecast MCP Server and run the Client CLI.
  3. Exercise the example flows and see agent actions immediately in your logs.
  4. When you’re ready, talk to us about enforcement.

  • AWS Marketplace: [link]

Actions leak louder than words. Secure actions.