Server Configuration
Describes the environment variables required to run the server.
| Name | Required | Description | Default |
|---|---|---|---|
| NIST_MCP_DATA_DIR | No | Directory for the local database and cached documents | ~/.nist-mcp |
| NIST_MCP_NVD_API_KEY | No | Optional NVD API key for higher rate limits (recommended) | |
| NIST_MCP_UPDATE_INTERVAL | No | Seconds between background database rebuilds (default: 7 days) | 604800 |
Capabilities
Features and capabilities supported by this server
| Capability | Details |
|---|---|
| tools | {
"listChanged": true
} |
| prompts | {
"listChanged": false
} |
| resources | {
"subscribe": false,
"listChanged": false
} |
| experimental | {} |
Tools
Functions exposed to the LLM to take actions
| Name | Description |
|---|---|
| update_database | Rebuild the NIST metadata index by downloading fresh data from NIST sources (XLSX, JSON, ZIP). Takes about 5-10 seconds. Use this if you need the most current publication or control data. |
| database_status | Show the current NIST metadata index status: build date, last update check, database size, and file path. Use this to verify the database is available and check data freshness. |
| search_publications | Search NIST publications by keyword across all series (SP 800, SP 1800, FIPS, IR, CSWP, AI). Returns matching publications with ID, title, date, and series. Use get_publication for full details on a specific publication. Default shows only the latest revision of each document. Do NOT use this for SP 800-53 security controls -- use search_controls instead. |
| get_publication | Get full metadata for a specific NIST publication including title, abstract, authors, date, supersedes chain, related publications, and list of supplemental materials. |
| get_document_content | Retrieve publication content as Markdown. Without section/pages, returns table of contents. With section, returns that section. With pages, returns those pages. Handles PDF, XLSX, CSV, JSON, and XML formats. Results are cached locally. Use this to read the actual content of NIST documents. For large documents like SP 800-53 (492 pages), use the pages parameter to request specific page ranges. |
| download_document | Download a publication PDF or supplemental material to local cache. Returns the file path. Use material_index to download a specific supplemental file listed in the get_publication output. |
| get_latest_revision | Resolve any publication to its newest available revision. Follows the supersedes chain. Use this when you need the most current version of a document. |
| search_controls | Search NIST SP 800-53 Rev 5 security and privacy controls by keyword, family, or baseline. Accepts flexible ID formats (AC-2, ac-2, AC2 all work). summary: label + title (~50 tokens/result) standard: + statement text + baselines (~200 tokens/result) full: + guidance + parameters + related controls (~500+ tokens/result) Use get_control for the complete detail of a specific control including enhancements. |
| get_control | Get complete details for a specific SP 800-53 Rev 5 control: statement, guidance, parameters, related controls, baselines, and cross-framework mappings. Set include_enhancements=True to also get all enhancement sub-controls. Do NOT use this for searching -- use search_controls to find controls first. |
| get_csf_data | Browse/search the NIST CSF 2.0 framework hierarchy. No args = list all 6 functions. function="PR" = Protect categories. category="PR.AC" = subcategories. query="risk" = full-text search. Includes count of mapped SP 800-53 controls per entry. |
| get_framework_mappings | Cross-reference frameworks. 'What CSF maps to AC-1?' or 'What 800-53 controls implement PR.AC?' Bidirectional lookup in the mappings table. |
| lookup_glossary | Look up NIST cybersecurity/privacy terms. Use 'term' for exact match, 'query' for keyword search. Returns definition, authoritative source, and related terms. |
| search_cmvp | Search FIPS 140-2/3 validated cryptographic modules. 'Is OpenSSL FIPS validated?' or 'Which modules support AES-256-GCM at Level 2?' |
| search_checklists | Search NCP security configuration checklists. 'SCAP checklists for Windows Server 2022' or 'CIS benchmarks for Ubuntu'. |
| search_nice_roles | Search NICE Framework work roles. 'What role handles incident response?' |
| search_cves | Search the NVD CVE database. Supports keyword, CVSS severity, CPE product, CWE weakness type, and date range filters. Set has_kev=True for only CISA Known Exploited Vulnerabilities. Results include CVE ID, description, severity, and score. May take 6+ seconds without an NVD API key due to rate limiting. |
| get_cve | Get full details for a CVE: description, CVSS scores, affected products (CPE), CWE classification, references, and CISA KEV status (if exploited: date added, due date, required action). Use this after search_cves to get complete vulnerability details. May take 6+ seconds without an NVD API key due to rate limiting. |
| search_cpes | Search the NVD CPE (Common Platform Enumeration) database for products and platforms. May take 6+ seconds without an NVD API key due to rate limiting. |
| get_cve_history | Get the change history for a CVE — when it was modified, what changed (score updates, CPE additions, CWE remaps). May take 6+ seconds without an NVD API key due to rate limiting. |
| search_nist | Search across ALL NIST data: publications, SP 800-53 controls, CSF framework, glossary, CMVP modules, checklists, and NICE roles. Results grouped by type. Use this as a starting point when you're not sure which specific tool to use. For targeted searches, use domain-specific tools (search_publications, search_controls, etc.). scope options: publications, controls, csf, glossary, cmvp, checklists, nice |
Prompts
Interactive templates invoked by user choice
| Name | Description |
|---|---|
| compliance_assessment | Assess system compliance against a NIST SP 800-53 baseline. |
| vulnerability_analysis | Analyze the impact of a specific CVE. |
| policy_draft | Draft a security policy based on NIST SP 800-53 controls. |
| incident_response_guide | Get NIST guidance for handling a specific type of security incident. |
Resources
Contextual data attached and managed by the client
| Name | Description |
|---|---|
| controls_families | All 20 SP 800-53 Rev 5 control families with one-line descriptions. |
| controls_baselines | LOW, MODERATE, HIGH, and PRIVACY baselines with control counts. |
| csf_overview | CSF 2.0 structure: 6 Functions with descriptions. |
| glossary_common | Top ~30 most commonly referenced NIST cybersecurity terms and definitions. |
| about | Server version, data freshness, and available tools guide. |