GIA MCP Server
AI Governance-as-a-Service for Claude-powered workflows. Connect via MCP to classify decisions, enforce gates, audit actions, and generate compliance evidence.
Quick Start
1. Get an API Key
Request an Explorer trial key or subscribe to Professional at /pricing. Your key will look like:
gia_a1b2c3d4e5f6...
2. Connect via Claude Code
Add the GIA MCP server to your project's .mcp.json in the project root:
.mcp.json
{
"mcpServers": {
"gia": {
"type": "http",
"url": "https://gia.aceadvising.com/mcp",
"headers": {
"Authorization": "Bearer ${GIA_API_KEY}"
}
}
}
}
3. Connect via Claude Desktop
Edit your Claude Desktop config (Settings > Developer > Edit Config):
claude_desktop_config.json
{
"mcpServers": {
"gia": {
"command": "npx",
"args": ["-y", "gia-mcp-server"],
"env": {
"GIA_API_KEY": "your-api-key-here"
}
}
}
}
4. Connect via API (Direct HTTP)
Any MCP-compatible client can connect to the Streamable HTTP endpoint:
POST https://gia.aceadvising.com/mcp
Authorization: Bearer <your-api-key>
Content-Type: application/json
GET https://gia.aceadvising.com/health
Your First Governance Call
Once connected, try classifying a decision. In Claude Code, just ask Claude:
Claude Code prompt
"Classify this decision: Generate a report summarizing Q4 financial results for the board"
Classification: ADVISORY
Confidence: 0.82
Rationale: Internal report generation — logged, no gate required
Mapped to: NIST AI RMF (GOVERN, MAP) | ISO 42001 (A.7.1)
Try these follow-up prompts to explore the platform's capabilities:
"Check the governance health of my system" — runs evaluate_threshold + system_status
"Score the governance of my last operation" — runs score_governance (Integrity, Accuracy, Compliance)
"Show me what NIST 800-53 controls GIA covers" — runs map_compliance
"Generate a full governance report" — runs generate_report
"Seal a memory pack for our VA claims SOPs" — runs seal_memory_pack
Authentication
The platform uses Bearer API key authentication. Include your key in every request:
Authorization: Bearer gia_your_api_key_here
- Keys are SHA-256 hashed at rest — the platform never stores plaintext keys
- One-time reveal — full key shown once at creation, masked forever after
- Key fingerprint — 8-character hash prefix for audit logs and identification
- Rate limited — Explorer: 10 req/min, Professional: 120 req/min, Enterprise: 600 req/min
- Revocation — keys can be instantly revoked via admin API
Transport
- Protocol: Streamable HTTP (MCP recommended transport)
- Sessions: Server-generated UUID via
Mcp-Session-Id header
- Session timeout: 30 minutes of inactivity
- TLS: All connections encrypted via HTTPS (TLS 1.2+)
- SSE: Not used — Streamable HTTP only
Tools (33)
Governance Core
Audit & Monitoring
Governed Memory Packs
Security Remediation (SRT)
Infrastructure Operations
Resources (5)
Prompts (4)
Compliance Frameworks
GIA maps governance controls to 16+ regulatory frameworks. Core four:
NIST AI RMF
Risk Management
Rate Limits
| Tier |
Requests/min |
Calls/day |
Price |
| Explorer |
10 |
100 |
14-day trial |
| Professional |
120 |
10,000 |
$500/mo |
| Enterprise |
600 |
50,000 |
Custom |
Support