{"id":109,"date":"2026-02-12T11:08:58","date_gmt":"2026-02-12T11:08:58","guid":{"rendered":"https:\/\/tenjinonline.com\/blog\/?p=109"},"modified":"2026-03-30T07:06:10","modified_gmt":"2026-03-30T07:06:10","slug":"mcp-ai-security-guide-2026","status":"publish","type":"post","link":"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/","title":{"rendered":"Securing the Future: A Guide to MCP and AI Security"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>MCP (Model Context Protocol) enhances AI security in banking by controlling how AI models access enterprise data and systems. It enables secure integrations, protects sensitive financial information, and ensures proper AI governance. By implementing MCP frameworks, financial institutions can deploy AI solutions safely while maintaining regulatory compliance and data security.<\/p>\n<\/blockquote>\n\n\n\n<p>Artificial Intelligence (AI) is transforming industries \u2014 from banking and fintech to healthcare and eCommerce. But as AI adoption accelerates, so do security risks. Organizations are now facing a critical question:<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#How_do_we_secure_AI_systems_without_slowing_innovation\" >How do we secure AI systems without slowing innovation?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Why_AI_Security_Matters_More_Than_Ever\" >Why AI Security Matters More Than Ever<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#What_is_MCP_Model_Context_Protocol\" >What is MCP (Model Context Protocol)?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Major_AI_Security_Risks_in_2026\" >Major AI Security Risks in 2026<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Prompt_Injection_Attacks\" >Prompt Injection Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Data_Leakage_Through_Context\" >Data Leakage Through Context<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Model_Poisoning\" >Model Poisoning<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Unauthorized_Tool_Access\" >Unauthorized Tool Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Shadow_AI\" >Shadow AI<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#How_MCP_Strengthens_AI_Security\" >How MCP Strengthens AI Security<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Context_Isolation\" >Context Isolation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Role-Based_Access_Control_RBAC\" >Role-Based Access Control (RBAC)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Policy_Enforcement_Layer\" >Policy Enforcement Layer<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Audit_Trails_Observability\" >Audit Trails &amp; Observability<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Tool_Invocation_Control\" >Tool Invocation Control<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#AI_Security_Best_Practices_for_Enterprises\" >AI Security Best Practices for Enterprises<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Implement_Zero-Trust_AI_Architecture\" >Implement Zero-Trust AI Architecture<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Encrypt_Model_Inputs_Outputs\" >Encrypt Model Inputs &amp; Outputs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Red_Team_Your_AI\" >Red Team Your AI<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Use_Secure_Model_Hosting\" >Use Secure Model Hosting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Continuous_Monitoring\" >Continuous Monitoring<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#AI_Security_in_BFSI_Why_Its_Critical\" >AI Security in BFSI: Why It\u2019s Critical<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#The_Future_of_AI_Security\" >The Future of AI Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Conclusion\" >Conclusion:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#FAQs\" >FAQs<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#What_is_MCP_in_AI_security\" >What is MCP in AI security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Why_is_MCP_important_for_banking_AI_systems\" >Why is MCP important for banking AI systems?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#How_does_MCP_improve_AI_security_in_financial_institutions\" >How does MCP improve AI security in financial institutions?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#What_are_the_benefits_of_MCP_for_enterprise_AI\" >What are the benefits of MCP for enterprise AI?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#Can_MCP_integrate_with_existing_banking_platforms\" >Can MCP integrate with existing banking platforms?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_do_we_secure_AI_systems_without_slowing_innovation\"><\/span><strong>How do we secure AI systems without slowing innovation?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>This is where <strong>MCP (Model Context Protocol)<\/strong> and modern AI security strategies play a vital role.<\/p>\n\n\n\n<p><strong>In this guide, we\u2019ll explore:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What MCP is<\/li>\n\n\n\n<li>Why AI security is becoming critical in 2026<\/li>\n\n\n\n<li>Key AI security threats<\/li>\n\n\n\n<li>How MCP strengthens AI governance<\/li>\n\n\n\n<li>Best practices to secure AI systems<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why_AI_Security_Matters_More_Than_Ever\"><\/span>Why AI Security Matters More Than Ever<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>AI systems today:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Process sensitive financial data<\/li>\n\n\n\n<li>Automate decision-making<\/li>\n\n\n\n<li>Power digital banking platforms<\/li>\n\n\n\n<li>Interact directly with customers<\/li>\n<\/ul>\n\n\n\n<p><strong>If compromised, the impact can include:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data breaches<\/li>\n\n\n\n<li>Biased decision-making<\/li>\n\n\n\n<li>Regulatory penalties<\/li>\n\n\n\n<li>Loss of customer trust<\/li>\n<\/ul>\n\n\n\n<p>As AI becomes more autonomous (AI agents, LLM-powered workflows, automation bots), traditional cybersecurity frameworks alone are not enough.<\/p>\n\n\n\n<p>AI needs <strong>AI-specific security governance.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_is_MCP_Model_Context_Protocol\"><\/span>What is MCP (Model Context Protocol)?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>MCP (Model Context Protocol) is an emerging framework designed to:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensure traceability and accountability<\/li>\n\n\n\n<li>Manage how AI models access and use data<\/li>\n\n\n\n<li>Control contextual memory<\/li>\n\n\n\n<li>Define permission boundaries<\/li>\n<\/ul>\n\n\n\n<p><strong>In simple terms:<\/strong><\/p>\n\n\n\n<p>MCP acts as a structured control layer between AI models and enterprise systems.<\/p>\n\n\n\n<p>Instead of allowing AI models to freely access databases, APIs, and internal tools, MCP ensures:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Controlled data exposure<\/li>\n\n\n\n<li>Clear access policies<\/li>\n\n\n\n<li>Context validation<\/li>\n\n\n\n<li>Secure interaction with external systems<\/li>\n<\/ul>\n\n\n\n<p>This is especially important in regulated sectors like <strong>BFSI, fintech, and healthcare.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Major_AI_Security_Risks_in_2026\"><\/span>Major AI Security Risks in 2026<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Let\u2019s break down the most critical threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Prompt_Injection_Attacks\"><\/span>Prompt Injection Attacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Attackers manipulate inputs to override model behavior and extract sensitive data.<\/p>\n\n\n\n<p><strong>Example:<\/strong><br><br>An AI chatbot in banking could be tricked into revealing confidential account information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Data_Leakage_Through_Context\"><\/span>Data Leakage Through Context<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>AI models often retain session memory. Without proper context isolation, sensitive information can leak across sessions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Model_Poisoning\"><\/span>Model Poisoning<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Attackers inject malicious or biased data into training pipelines, corrupting outputs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Unauthorized_Tool_Access\"><\/span>Unauthorized Tool Access<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>AI agents integrated with APIs can execute unintended actions if not restricted.<\/p>\n\n\n\n<p><strong>For example:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Triggering financial transactions<\/li>\n\n\n\n<li>Accessing customer databases<\/li>\n\n\n\n<li>Modifying internal records<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Shadow_AI\"><\/span>Shadow AI<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Employees using unapproved AI tools can expose confidential business data unintentionally.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_MCP_Strengthens_AI_Security\"><\/span>How MCP Strengthens AI Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>MCP introduces structured control mechanisms that reduce these risks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Context_Isolation\"><\/span>Context Isolation<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Each AI interaction is sandboxed.<br>No cross-session memory leakage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Role-Based_Access_Control_RBAC\"><\/span>Role-Based Access Control (RBAC)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>AI models can only access:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Approved APIs<\/li>\n\n\n\n<li>Specific datasets<\/li>\n\n\n\n<li>Authorized tools<\/li>\n<\/ul>\n\n\n\n<p>This prevents excessive privilege access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Policy_Enforcement_Layer\"><\/span>Policy Enforcement Layer<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>MCP enforces:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data masking rules<\/li>\n\n\n\n<li>PII protection policies<\/li>\n\n\n\n<li>Regulatory compliance checks<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Audit_Trails_Observability\"><\/span>Audit Trails &amp; Observability<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Every AI interaction is logged:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Who accessed what<\/li>\n\n\n\n<li>What data was used<\/li>\n\n\n\n<li>What output was generated<\/li>\n<\/ul>\n\n\n\n<p><strong>This supports compliance frameworks like:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>GDPR<\/li>\n\n\n\n<li>ISO 27001<\/li>\n\n\n\n<li>SOC 2<\/li>\n\n\n\n<li>RBI guidelines (for Indian banking)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Tool_Invocation_Control\"><\/span>Tool Invocation Control<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>AI agents must request permission before:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Calling APIs<\/li>\n\n\n\n<li>Triggering workflows<\/li>\n\n\n\n<li>Accessing external systems<\/li>\n<\/ul>\n\n\n\n<p>This significantly reduces automated attack surfaces.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"AI_Security_Best_Practices_for_Enterprises\"><\/span>AI Security Best Practices for Enterprises<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>Here are practical steps organizations should follow:<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Implement_Zero-Trust_AI_Architecture\"><\/span>Implement Zero-Trust AI Architecture<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Never assume AI components are secure by default.<br>Verify:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tool access<\/li>\n\n\n\n<li>Data sources<\/li>\n\n\n\n<li>Model outputs<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Encrypt_Model_Inputs_Outputs\"><\/span>Encrypt Model Inputs &amp; Outputs<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Sensitive data should be encrypted:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>During inference (where possible)<\/li>\n\n\n\n<li>At rest<\/li>\n\n\n\n<li>In transit<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Red_Team_Your_AI\"><\/span>Red Team Your AI<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Conduct:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Prompt injection testing<\/li>\n\n\n\n<li>Adversarial testing<\/li>\n\n\n\n<li>Data exfiltration simulations<\/li>\n<\/ul>\n\n\n\n<p>AI needs penetration testing just like web apps.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Use_Secure_Model_Hosting\"><\/span>Use Secure Model Hosting<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Avoid exposing models directly to public endpoints without:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Authentication<\/li>\n\n\n\n<li>Rate limiting<\/li>\n\n\n\n<li>Abuse detection<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Continuous_Monitoring\"><\/span>Continuous Monitoring<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Monitor:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Abnormal query patterns<\/li>\n\n\n\n<li>Suspicious prompt structures<\/li>\n\n\n\n<li>Unusual API calls<\/li>\n<\/ul>\n\n\n\n<p>Real-time anomaly detection is critical.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"AI_Security_in_BFSI_Why_Its_Critical\"><\/span>AI Security in BFSI: Why It\u2019s Critical<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Since you often work around BFSI and testing domains, this is especially relevant.<\/p>\n\n\n\n<p><strong>In banking:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AI powers loan approvals<\/li>\n\n\n\n<li>Fraud detection models<\/li>\n\n\n\n<li>KYC verification<\/li>\n\n\n\n<li>Customer chatbots<\/li>\n<\/ul>\n\n\n\n<p><strong>A single vulnerability could:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Expose financial data<\/li>\n\n\n\n<li>Trigger regulatory penalties<\/li>\n\n\n\n<li>Damage brand reputation<\/li>\n<\/ul>\n\n\n\n<p>MCP ensures AI remains compliant, secure, and auditable.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Future_of_AI_Security\"><\/span>The Future of AI Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>By 2026 and beyond, we\u2019ll see:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AI Security Operations Centers (AI-SOC)<\/li>\n\n\n\n<li>Standardized AI governance frameworks<\/li>\n\n\n\n<li>AI-specific compliance certifications<\/li>\n\n\n\n<li>Automated security validation for AI agents<\/li>\n<\/ul>\n\n\n\n<p>Security will no longer be optional \u2014 it will be a competitive differentiator.<\/p>\n\n\n\n<p><strong>Organizations that secure AI early will:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reduce regulatory risk<\/li>\n\n\n\n<li>Build customer trust<\/li>\n\n\n\n<li>Accelerate innovation<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>AI is powerful \u2014 but power without control is risky.<\/p>\n\n\n\n<p>MCP introduces structured governance, controlled context handling, and policy enforcement to make AI systems secure, scalable, and compliant.<\/p>\n\n\n\n<p>If organizations want to truly secure the future, they must treat AI security as a strategic priority \u2014 not just a technical afterthought.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"FAQs\"><\/span>FAQs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-rank-math-faq-block\"><div class=\"rank-math-faq-item\"><h3 class=\"rank-math-question\"><span class=\"ez-toc-section\" id=\"What_is_MCP_in_AI_security\"><\/span>What is MCP in AI security?<span class=\"ez-toc-section-end\"><\/span><\/h3><div class=\"rank-math-answer\">MCP (Model Context Protocol) is a framework that manages how AI models access and use external data sources securely. It ensures that AI systems operate with controlled context, reducing risks such as data leakage or unauthorized access.<\/div><\/div><div class=\"rank-math-faq-item\"><h3 class=\"rank-math-question\"><span class=\"ez-toc-section\" id=\"Why_is_MCP_important_for_banking_AI_systems\"><\/span>Why is MCP important for banking AI systems?<span class=\"ez-toc-section-end\"><\/span><\/h3><div class=\"rank-math-answer\">Banking applications handle highly sensitive financial data. MCP helps ensure secure AI operations by controlling data access, managing model interactions, and enforcing security policies across AI workflows.<\/div><\/div><div class=\"rank-math-faq-item\"><h3 class=\"rank-math-question\"><span class=\"ez-toc-section\" id=\"How_does_MCP_improve_AI_security_in_financial_institutions\"><\/span>How does MCP improve AI security in financial institutions?<span class=\"ez-toc-section-end\"><\/span><\/h3><div class=\"rank-math-answer\">MCP improves AI security by providing structured communication between AI models and enterprise systems. It ensures secure data retrieval, context validation, and controlled access to sensitive banking information.<\/div><\/div><div class=\"rank-math-faq-item\"><h3 class=\"rank-math-question\"><span class=\"ez-toc-section\" id=\"What_are_the_benefits_of_MCP_for_enterprise_AI\"><\/span>What are the benefits of MCP for enterprise AI?<span class=\"ez-toc-section-end\"><\/span><\/h3><div class=\"rank-math-answer\"><strong>Key benefits include:<\/strong><br>Improved AI security and governance<br>Controlled access to enterprise data<br>Reduced risk of data leakage<br>Better compliance with financial regulations<br>Secure integration with enterprise systems<\/div><\/div><div class=\"rank-math-faq-item\"><h3 class=\"rank-math-question\"><span class=\"ez-toc-section\" id=\"Can_MCP_integrate_with_existing_banking_platforms\"><\/span>Can MCP integrate with existing banking platforms?<span class=\"ez-toc-section-end\"><\/span><\/h3><div class=\"rank-math-answer\">Yes. MCP frameworks can integrate with APIs, enterprise databases, and cloud platforms to ensure secure communication between AI models and banking applications.<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>MCP (Model Context Protocol) enhances AI security in banking by controlling how AI models access enterprise data and systems. It [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[170],"tags":[176,173,177,172,174,51,171,175,178],"class_list":["post-109","post","type-post","status-publish","format-standard","hentry","category-ai-in-banking","tag-ai-compliance","tag-ai-governance","tag-ai-risk-management","tag-ai-security","tag-bfsi-security","tag-enterprise-ai","tag-mcp","tag-prompt-injection","tag-secure-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MCP AI Security in Banking \u2013 Free Guide (2026)<\/title>\n<meta name=\"description\" content=\"Learn how MCP secures AI systems in banking. This free guide explains Model Context Protocol security, AI governance, and secure enterprise AI architecture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MCP AI Security in Banking \u2013 Free Guide (2026)\" \/>\n<meta property=\"og:description\" content=\"Learn how MCP secures AI systems in banking. This free guide explains Model Context Protocol security, AI governance, and secure enterprise AI architecture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"Tenjin Workbench\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-12T11:08:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T07:06:10+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/ai-in-banking\\\/mcp-ai-security-guide-2026\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/ai-in-banking\\\/mcp-ai-security-guide-2026\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/#\\\/schema\\\/person\\\/93030a399fe9651338e757ff59df3be8\"},\"headline\":\"Securing the Future: A Guide to MCP and AI Security\",\"datePublished\":\"2026-02-12T11:08:58+00:00\",\"dateModified\":\"2026-03-30T07:06:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/ai-in-banking\\\/mcp-ai-security-guide-2026\\\/\"},\"wordCount\":969,\"publisher\":{\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/#organization\"},\"keywords\":[\"AI Compliance\",\"AI Governance\",\"AI Risk Management\",\"AI Security\",\"BFSI Security\",\"Enterprise AI\",\"MCP\",\"Prompt Injection\",\"Secure AI\"],\"articleSection\":[\"AI in Banking\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/ai-in-banking\\\/mcp-ai-security-guide-2026\\\/\",\"url\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/ai-in-banking\\\/mcp-ai-security-guide-2026\\\/\",\"name\":\"MCP AI Security in Banking \u2013 Free Guide (2026)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/#website\"},\"datePublished\":\"2026-02-12T11:08:58+00:00\",\"dateModified\":\"2026-03-30T07:06:10+00:00\",\"description\":\"Learn how MCP secures AI systems in banking. This free guide explains Model Context Protocol security, AI governance, and secure enterprise AI architecture.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/ai-in-banking\\\/mcp-ai-security-guide-2026\\\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/ai-in-banking\\\/mcp-ai-security-guide-2026\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/ai-in-banking\\\/mcp-ai-security-guide-2026\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the Future: A Guide to MCP and AI Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/\",\"name\":\"Tenjin Workbench\",\"description\":\"Tenjin Workbench Blogs\",\"publisher\":{\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/#organization\",\"name\":\"Tenjin Workbench\",\"url\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cropped-logotenjin.png\",\"contentUrl\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cropped-logotenjin.png\",\"width\":895,\"height\":401,\"caption\":\"Tenjin Workbench\"},\"image\":{\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/#\\\/schema\\\/person\\\/93030a399fe9651338e757ff59df3be8\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9665ef8ed072e5ebb03f3bc08eb363090b38ba9c8b97b24899b45d99d9c764fb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9665ef8ed072e5ebb03f3bc08eb363090b38ba9c8b97b24899b45d99d9c764fb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9665ef8ed072e5ebb03f3bc08eb363090b38ba9c8b97b24899b45d99d9c764fb?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/tenjinonline.com\\\/blog\"],\"url\":\"https:\\\/\\\/tenjinonline.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MCP AI Security in Banking \u2013 Free Guide (2026)","description":"Learn how MCP secures AI systems in banking. This free guide explains Model Context Protocol security, AI governance, and secure enterprise AI architecture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/","og_locale":"en_US","og_type":"article","og_title":"MCP AI Security in Banking \u2013 Free Guide (2026)","og_description":"Learn how MCP secures AI systems in banking. This free guide explains Model Context Protocol security, AI governance, and secure enterprise AI architecture.","og_url":"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/","og_site_name":"Tenjin Workbench","article_published_time":"2026-02-12T11:08:58+00:00","article_modified_time":"2026-03-30T07:06:10+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#article","isPartOf":{"@id":"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/"},"author":{"name":"admin","@id":"https:\/\/tenjinonline.com\/blog\/#\/schema\/person\/93030a399fe9651338e757ff59df3be8"},"headline":"Securing the Future: A Guide to MCP and AI Security","datePublished":"2026-02-12T11:08:58+00:00","dateModified":"2026-03-30T07:06:10+00:00","mainEntityOfPage":{"@id":"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/"},"wordCount":969,"publisher":{"@id":"https:\/\/tenjinonline.com\/blog\/#organization"},"keywords":["AI Compliance","AI Governance","AI Risk Management","AI Security","BFSI Security","Enterprise AI","MCP","Prompt Injection","Secure AI"],"articleSection":["AI in Banking"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/","url":"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/","name":"MCP AI Security in Banking \u2013 Free Guide (2026)","isPartOf":{"@id":"https:\/\/tenjinonline.com\/blog\/#website"},"datePublished":"2026-02-12T11:08:58+00:00","dateModified":"2026-03-30T07:06:10+00:00","description":"Learn how MCP secures AI systems in banking. This free guide explains Model Context Protocol security, AI governance, and secure enterprise AI architecture.","breadcrumb":{"@id":"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/tenjinonline.com\/blog\/ai-in-banking\/mcp-ai-security-guide-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tenjinonline.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing the Future: A Guide to MCP and AI Security"}]},{"@type":"WebSite","@id":"https:\/\/tenjinonline.com\/blog\/#website","url":"https:\/\/tenjinonline.com\/blog\/","name":"Tenjin Workbench","description":"Tenjin Workbench Blogs","publisher":{"@id":"https:\/\/tenjinonline.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tenjinonline.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/tenjinonline.com\/blog\/#organization","name":"Tenjin Workbench","url":"https:\/\/tenjinonline.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/tenjinonline.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/tenjinonline.com\/blog\/wp-content\/uploads\/2026\/03\/cropped-logotenjin.png","contentUrl":"https:\/\/tenjinonline.com\/blog\/wp-content\/uploads\/2026\/03\/cropped-logotenjin.png","width":895,"height":401,"caption":"Tenjin Workbench"},"image":{"@id":"https:\/\/tenjinonline.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tenjinonline.com\/blog\/#\/schema\/person\/93030a399fe9651338e757ff59df3be8","name":"admin","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/9665ef8ed072e5ebb03f3bc08eb363090b38ba9c8b97b24899b45d99d9c764fb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9665ef8ed072e5ebb03f3bc08eb363090b38ba9c8b97b24899b45d99d9c764fb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9665ef8ed072e5ebb03f3bc08eb363090b38ba9c8b97b24899b45d99d9c764fb?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/tenjinonline.com\/blog"],"url":"https:\/\/tenjinonline.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/tenjinonline.com\/blog\/wp-json\/wp\/v2\/posts\/109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tenjinonline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tenjinonline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tenjinonline.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tenjinonline.com\/blog\/wp-json\/wp\/v2\/comments?post=109"}],"version-history":[{"count":4,"href":"https:\/\/tenjinonline.com\/blog\/wp-json\/wp\/v2\/posts\/109\/revisions"}],"predecessor-version":[{"id":739,"href":"https:\/\/tenjinonline.com\/blog\/wp-json\/wp\/v2\/posts\/109\/revisions\/739"}],"wp:attachment":[{"href":"https:\/\/tenjinonline.com\/blog\/wp-json\/wp\/v2\/media?parent=109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tenjinonline.com\/blog\/wp-json\/wp\/v2\/categories?post=109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tenjinonline.com\/blog\/wp-json\/wp\/v2\/tags?post=109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}