AIplatform

Regulated Industries Are About to Repeat Their Cloud Migration Mistake — With AI Agents

By Robert Foerster
Picture of the author
Published on
Free AI and AI Agents vs heavy regulation — easy regulation, no thank you

If you work in banking, insurance, energy or healthcare, you know the reflex: block first, ask for a risk assessment, line up DORA, BAIT, ISO 27001, wait. Reasonable — and still the wrong answer when the tool shifts the output factor. Standing still in a regulated environment isn't neutral, it's falling behind. The honest question isn't whether agentic dev tools get used, but under which guardrails. Leave it to the individual developer and you end up with fifty bespoke setups, fifty MCP configurations, fifty potential data leaks — and no auditable line.

The Fix Is Organisational, Not Technical

Set up an internal Skills Marketplace as the single source of truth for approved skills and MCP servers. Skills are the primary vehicle. MCPs aren't distributed separately — they're embedded inside the skills, with explicit rules for when an MCP is allowed to load. Without those rules every skill pulls everything, token costs explode, and sensitive data lands in contexts where it has no business being. Versioned, peer-reviewed, signed, wired into every developer's default profile — an internal Maven repo, just for skills.

Why MCPs Are the Core Piece

Two reasons, both non-negotiable in regulated settings.

  • Determinism: an MCP returns structured, scoped data instead of raw dumps the model has to interpret freshly each time. Same query, same answer.
  • Token economics: a custom MCP filters at the source, so the model sees the relevant 5%, not the full log file.

The compliance bonus comes for free — system permissions live on the MCP service account, not on the developer.

The Initial Default Set — Five with the Highest Leverage
Architecture Skill

Best practices from the architecture team, codified instead of trapped in their heads or buried in a wiki nobody reads. The skill doesn't just enforce rules; it asks the developer the right questions back: what are you building, what's the data flow, is this a tier-1 service, who consumes it. Based on the answers it recommends from the approved library set with rationale — same starting point for a junior as for a principal. The architecture team scales without being a permanent bottleneck for every new service.

Pipeline Debug Skill

A support skill in the literal sense: developers stop opening tickets or pinging Slack every time a CI/CD run goes red. The DevOps-built custom MCP returns pre-filtered stages, logs and artefacts, so the skill performs the first-line triage that the DevOps team used to do manually. They only see the genuinely hard cases — not the seventh "deploy is broken" interrupt that turned out to be a missing env var. Faster feedback for the developer, fewer context-switches for the platform team.

Incident Response Skill

Bridges live cluster symptom and the code that caused it. The k8sgpt-MCP as an in-cluster operator is deliberately read-only — that's the compliance design choice, not an afterthought. The developer never holds cluster credentials; the operator does, scoped strictly to read. Unwanted writes against the cluster become structurally impossible. A service-catalog-MCP resolves pod label to owner-team and repo, a repo-MCP pulls the relevant Helm chart. Output isn't kubectl describe, it's "OOMKilled in payments-api, values-prod.yaml line 47 sets 256Mi, tier-1 standard is 1Gi, here's the PR."

Compliance Skill

Every manifest edit checked against the allow-list via MCP. The skill doesn't carry the rules itself; it queries the authoritative sources directly: the licence registry for what's permitted, the CVE management system for vulnerability status and remediation SLAs, the dependency catalogue for approved versions. Non-approved libraries aren't suggested at all. Legitimate needs auto-file a pre-populated ticket into the existing approval process. Immutable audit trail for every override. Compliance as an editor default, not a pipeline gate.

Infrastructure Skill

The architecture skill's counterpart for the platform side. Cloud isn't a self-service buffet where any team spins up whatever managed service looked good in a conference talk. The skill knows the company's core stack — chosen database, object store, message broker, container platform — and steers every new component toward it. Niche services get flagged, the approved alternative surfaced, exceptions routed through the architecture board. Mandatory tags track cost centre, owner and regulatory scope (DORA, PCI) from day one. The skill cannot deploy to production directly — that flows through the existing CI/CD gates, exactly the control point examiners look for.

Net Effect

Compliance load shifts from the individual to the platform team. Adoption accelerates because nobody has to source and vet their own MCPs. And in the audit conversation you can point to which skill loads which MCP under which conditions — the difference between "we don't really know" and an auditable default.

Waiting until "the industry has solved it" repeats the lag the same firms built up around DevOps and cloud migration. The answer isn't less tooling. It's a curated default the developer doesn't have to build themselves.