A2A vs MCP: The Two-Protocol Stack for Agentic Systems
Google published a Developer's Guide to AI Agent Protocols that clarifies a distinction that has caused significant confusion in the community: the Model Context Protocol (MCP) and Agent-to-Agent Protocol (A2A) are not competing standards—they solve fundamentally different problems and are designed to be used together.
MCP handles agent-to-tool communication. An MCP server exposes a set of capabilities—database queries, API calls, file access—and the agent discovers and invokes them through a standardised interface. The agent does not need to know in advance what tools are available; MCP servers advertise their capabilities at registration time. This is the data-access layer of an agentic system.
A2A handles agent-to-agent communication. Where MCP exposes tools, A2A exposes agents. Each A2A-compatible agent publishes an Agent Card at a well-known URL describing its name, capabilities, and communication endpoint. An orchestrating agent discovers specialist agents through their cards and delegates sub-tasks to them, regardless of which framework or vendor built those agents. A2A solves the multi-agent coordination challenge that MCP alone cannot address: how do two independently-built agents, potentially from different organisations, discover each other and interoperate?
Both protocols are now governed by the Linux Foundation's Agentic AI Foundation (AAIF), which launched in December 2025 with OpenAI, Anthropic, Google, Microsoft, AWS, and Block as co-founders. This shared governance structure reduces the risk of one vendor's implementation becoming the de facto standard through distribution rather than merit. The practical architecture emerging from the community is to adopt MCP first for foundational data access, then layer A2A on top when the system grows to require specialist agent delegation. Starting with A2A before MCP is in place typically results in agents that can talk to each other but can't usefully act on anything.
Read more — Google Developers Blog
MCP 2026 Roadmap: Governance Maturation and Enterprise Security on the Horizon
The Model Context Protocol project published its 2026 roadmap, outlining four priority areas: transport scalability, agent communication, governance maturation, and enterprise readiness. The shift from release-milestone planning to working-group-driven development is the structural change most significant for contributors: the roadmap introduces a contributor ladder and delegated SEP (Specification Enhancement Proposal) review process, meaning community members can now take ownership of areas of the specification without requiring core maintainer involvement on every decision.
Security improvements are explicitly on the roadmap but framed as secondary to governance and transport work. The proposals cited—DPoP (Demonstration of Proof of Possession) and workload identity federation—would address the most widely-criticised gap in current MCP deployments: the lack of enforced authentication between agents and MCP servers. Security assessments earlier in 2026 found command injection vulnerabilities in a significant proportion of tested MCP implementations, and the absence of built-in authentication continues to be the primary objection raised by enterprise security teams evaluating MCP for production use.
The April 2026 MCP Dev Summit North America drew approximately 1,200 attendees to New York City, a signal that despite the criticism the protocol has attracted, developer adoption continues at pace. The formal governance structure arriving through AAIF and the roadmap's explicit focus on enterprise requirements suggest the project is attempting to evolve from a rapid-adoption protocol into something suitable for regulated industries with audit and identity management requirements.
For teams evaluating MCP for production use today, the practical recommendation remains: use MCP for development and prototyping, implement your own authentication wrapper for any deployment where MCP servers have access to sensitive data, and watch the DPoP and workload identity proposals for a path to native security without the wrapper.
Read more — Model Context Protocol Blog