As GitHub Copilot expands its capabilities through the Model Context Protocol (MCP), it introduces an extra security challenge: how to give developers access to powerful AI tools while maintaining control over what external services those tools can access. This post walks you through setting up a curated MCP registry and enforcing access controls across your organization or enterprise when using Github Copilot. Why restrict access? MCP servers extend Copilot's capabilities by connecting it to external tools, databases, APIs, and services. While this opens up incredible possibilities for developer productivity, it also introduces potential security risks. Without proper controls, developers could: Connect Copilot to unauthorized external services Expose sensitive data to third-party MCP servers Use tools that don't meet your organization's security or compliance requirements Bypass established security policies through AI-assisted workflows A way is n...