Your development team wants to deploy AI assistants that can:
Meanwhile, security teams are asking critical questions:
The challenge: How do you give AI agents the access they require without introducing new security risks?
In this talk, I demonstrate how to build secure AI agent infrastructure from day one using Zero Trust patterns and the Model Context Protocol (MCP).
Drawing from real-world production experience building MCP servers at Pomerium, I present practical, deployable patterns using open-source tooling.
AI agents require infrastructure access. However, traditional OAuth was not designed for AI-driven automation use cases.
OAuth scopes are typically too coarse-grained:
repo scope grants read/write access to everything repository-related.chat:write allows agents to post anywhere.The result is overprivileged AI agents.
An agent that only needs to create pull requests can also merge pull requests, delete branches, and modify repository settings.
The solution is not to block AI agents. The solution is to build proper infrastructure around them.
I demonstrate a dual-layer Zero Trust architecture using the Model Context Protocol (MCP) that works with any MCP server.
I demonstrate this architecture using the GitHub MCP server:
repo scope.The same patterns apply whether you're securing GitHub access, Slack integrations, internal APIs, or any other service your AI agents interact with.
Observability: Complete audit trails of AI agent activity integrated with your existing logging infrastructure.
Developer Experience: Security patterns that do not slow down development workflows.
Production Ready: Deploy today using open-source components under the Apache 2.0 license.
Incremental Adoption: Add security controls to existing AI agent deployments without rewriting everything.
The Model Context Protocol is becoming a standard for extending AI assistants such as Claude, ChatGPT, and VS Code Copilot.
As DevOps teams deploy these agents into production workflows, solid infrastructure patterns make the difference between experimental tooling and production-ready systems.
The live demo uses Pomerium Zero to accelerate policy updates during the presentation. However, all demonstrated patterns are fully implementable in the open-source version via YAML configuration.
Open-source repository: https://github.com/pomerium/pomerium
The MCP server code and authorization policies will be available immediately after the talk:
https://github.com/nickytonline/github-mcp-http
