GIA MCP Server
AI Governance-as-a-Service for Claude-powered workflows. Connect via MCP to classify decisions, enforce gates, audit actions, and generate compliance evidence.
Quick Start
1. Get an API Key
Sign up for a free Starter key or subscribe to Professional at /pricing. Your key will look like:
gia_a1b2c3d4e5f6...
2. Connect via Claude Code
Add the GIA MCP server to your project's .mcp.json in the project root:
.mcp.json
{
"mcpServers": {
"gia": {
"type": "http",
"url": "https://gia.aceadvising.com/mcp",
"headers": {
"Authorization": "Bearer ${GIA_API_KEY}"
}
}
}
}
3. Connect via Claude Desktop
Edit your Claude Desktop config (Settings > Developer > Edit Config):
claude_desktop_config.json
{
"mcpServers": {
"gia": {
"command": "npx",
"args": ["-y", "gia-mcp-server"],
"env": {
"GIA_API_KEY": "your-api-key-here"
}
}
}
}
4. Connect via API (Direct HTTP)
Any MCP-compatible client can connect to the Streamable HTTP endpoint:
POST https://gia.aceadvising.com/mcp
Authorization: Bearer <your-api-key>
Content-Type: application/json
GET https://gia.aceadvising.com/health
Your First Governance Call
Once connected, try classifying a decision. In Claude Code, just ask Claude:
Claude Code prompt
"Classify this decision: Generate a report summarizing Q4 financial results for the board"
Classification: ADVISORY
Confidence: 0.82
Rationale: Internal report generation — logged, no gate required
Mapped to: NIST AI RMF (GOVERN, MAP) | ISO 42001 (A.7.1)
Try these follow-up prompts to explore the platform's capabilities:
"Check the governance health of my system" — runs evaluate_threshold + system_status
"Score the governance of my last operation" — runs score_governance (Integrity, Accuracy, Compliance)
"Show me what NIST 800-53 controls GIA covers" — runs map_compliance
"Generate a full governance report" — runs generate_report
"Seal a memory pack for our VA claims SOPs" — runs seal_memory_pack
Authentication
The platform uses Bearer API key authentication. Include your key in every request:
Authorization: Bearer gia_your_api_key_here
- Keys are SHA-256 hashed at rest — the platform never stores plaintext keys
- One-time reveal — full key shown once at creation, masked forever after
- Key fingerprint — 8-character hash prefix for audit logs and identification
- Rate limited — Starter: 30 req/min, Professional: 120 req/min, Enterprise: 600 req/min
- Revocation — keys can be instantly revoked via admin API
Transport
- Protocol: Streamable HTTP (MCP recommended transport)
- Sessions: Server-generated UUID via
Mcp-Session-Id header
- Session timeout: 30 minutes of inactivity
- TLS: All connections encrypted via HTTPS (TLS 1.2+)
- SSE: Not used — Streamable HTTP only
Tools (29)
Governance Core
Audit & Monitoring
Governed Memory Packs
Security Remediation (SRT)
Infrastructure Operations
Resources (5)
Prompts (4)
Compliance Frameworks
ACE maps governance controls to four major regulatory frameworks:
NIST AI RMF
Risk Management
Rate Limits
| Tier |
Requests/min |
Calls/day |
Price |
| Starter |
30 |
1,000 |
Free |
| Professional |
120 |
10,000 |
$500/mo |
| Enterprise |
600 |
50,000 |
Custom |
Support