kiro-agent-team 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.kiro/README.md +228 -0
- package/.kiro/agents/backend-engineer.json +6 -0
- package/.kiro/agents/backend-engineer.md +643 -0
- package/.kiro/agents/database-specialist.json +6 -0
- package/.kiro/agents/database-specialist.md +390 -0
- package/.kiro/agents/development-logger.json +6 -0
- package/.kiro/agents/development-logger.md +265 -0
- package/.kiro/agents/devops-engineer.json +6 -0
- package/.kiro/agents/devops-engineer.md +287 -0
- package/.kiro/agents/frontend-architect.json +6 -0
- package/.kiro/agents/frontend-architect.md +1032 -0
- package/.kiro/agents/hooks/backend-engineer-hooks.yaml +540 -0
- package/.kiro/agents/hooks/database-specialist-hooks.yaml +488 -0
- package/.kiro/agents/hooks/development-logger-hooks.yaml +361 -0
- package/.kiro/agents/hooks/devops-engineer-hooks.yaml +345 -0
- package/.kiro/agents/hooks/frontend-architect-hooks.yaml +521 -0
- package/.kiro/agents/hooks/project-manager-hooks.yaml +513 -0
- package/.kiro/agents/hooks/security-specialist-hooks.yaml +358 -0
- package/.kiro/agents/hooks/test-orchestrator-hooks.yaml +380 -0
- package/.kiro/agents/hooks/ui-ux-designer-hooks.yaml +353 -0
- package/.kiro/agents/project-manager.json +6 -0
- package/.kiro/agents/project-manager.md +344 -0
- package/.kiro/agents/prompts/backend-engineer-system.md +815 -0
- package/.kiro/agents/prompts/database-specialist-system.md +332 -0
- package/.kiro/agents/prompts/development-logger-system.md +232 -0
- package/.kiro/agents/prompts/devops-engineer-system.md +260 -0
- package/.kiro/agents/prompts/frontend-architect-system.md +305 -0
- package/.kiro/agents/prompts/project-manager-system.md +285 -0
- package/.kiro/agents/prompts/security-specialist-system.md +231 -0
- package/.kiro/agents/prompts/test-orchestrator-system.md +214 -0
- package/.kiro/agents/prompts/ui-ux-designer-system.md +270 -0
- package/.kiro/agents/security-specialist.json +6 -0
- package/.kiro/agents/security-specialist.md +277 -0
- package/.kiro/agents/test-orchestrator.json +6 -0
- package/.kiro/agents/test-orchestrator.md +266 -0
- package/.kiro/agents/ui-ux-designer.json +6 -0
- package/.kiro/agents/ui-ux-designer.md +284 -0
- package/.kiro/devlog/00-START-HERE.md +444 -0
- package/.kiro/devlog/COMPLETE-WORKFLOW.md +553 -0
- package/.kiro/devlog/DEVLOG-INTEGRATION.md +413 -0
- package/.kiro/devlog/DEVLOG-PROCESS-FLOWS.md +484 -0
- package/.kiro/devlog/DEVLOG-QUICK-REF.md +299 -0
- package/.kiro/devlog/DEVLOG.md +22 -0
- package/.kiro/devlog/IMPLEMENTATION-COMPLETE.txt +434 -0
- package/.kiro/devlog/IMPLEMENTATION-SUMMARY.md +358 -0
- package/.kiro/devlog/README.md +363 -0
- package/.kiro/devlog/devlog-update.bat +136 -0
- package/.kiro/devlog/devlog-update.sh +275 -0
- package/.kiro/devlog/feature-completion-hook.bat +78 -0
- package/.kiro/devlog/feature-completion-hook.sh +84 -0
- package/.kiro/documentation/cli.md +31 -0
- package/.kiro/documentation/docs_cli.md +41 -0
- package/.kiro/documentation/docs_cli_authentication.md +43 -0
- package/.kiro/documentation/docs_cli_autocomplete.md +132 -0
- package/.kiro/documentation/docs_cli_billing.md +31 -0
- package/.kiro/documentation/docs_cli_billing_contact-support.md +43 -0
- package/.kiro/documentation/docs_cli_billing_managing-taxes.md +67 -0
- package/.kiro/documentation/docs_cli_billing_related-questions.md +49 -0
- package/.kiro/documentation/docs_cli_billing_subscription-portal.md +31 -0
- package/.kiro/documentation/docs_cli_chat.md +84 -0
- package/.kiro/documentation/docs_cli_chat_configuration.md +40 -0
- package/.kiro/documentation/docs_cli_chat_context.md +258 -0
- package/.kiro/documentation/docs_cli_chat_git-aware-selection.md +41 -0
- package/.kiro/documentation/docs_cli_chat_images.md +53 -0
- package/.kiro/documentation/docs_cli_chat_manage-prompts.md +216 -0
- package/.kiro/documentation/docs_cli_chat_model-selection.md +153 -0
- package/.kiro/documentation/docs_cli_chat_permissions.md +68 -0
- package/.kiro/documentation/docs_cli_chat_planning-agent.md +230 -0
- package/.kiro/documentation/docs_cli_chat_responding.md +123 -0
- package/.kiro/documentation/docs_cli_chat_security.md +87 -0
- package/.kiro/documentation/docs_cli_chat_subagents.md +77 -0
- package/.kiro/documentation/docs_cli_code-intelligence.md +251 -0
- package/.kiro/documentation/docs_cli_custom-agents.md +37 -0
- package/.kiro/documentation/docs_cli_custom-agents_configuration-reference.md +941 -0
- package/.kiro/documentation/docs_cli_custom-agents_creating.md +93 -0
- package/.kiro/documentation/docs_cli_custom-agents_examples.md +360 -0
- package/.kiro/documentation/docs_cli_custom-agents_troubleshooting.md +180 -0
- package/.kiro/documentation/docs_cli_enterprise_billing.md +33 -0
- package/.kiro/documentation/docs_cli_enterprise_concepts.md +34 -0
- package/.kiro/documentation/docs_cli_enterprise_getting-started.md +19 -0
- package/.kiro/documentation/docs_cli_enterprise_iam.md +251 -0
- package/.kiro/documentation/docs_cli_enterprise_monitor-and-track.md +15 -0
- package/.kiro/documentation/docs_cli_enterprise_monitor-and-track_dashboard.md +62 -0
- package/.kiro/documentation/docs_cli_enterprise_monitor-and-track_prompt-logging.md +165 -0
- package/.kiro/documentation/docs_cli_enterprise_monitor-and-track_user-activity.md +123 -0
- package/.kiro/documentation/docs_cli_enterprise_settings.md +15 -0
- package/.kiro/documentation/docs_cli_enterprise_subscribe.md +36 -0
- package/.kiro/documentation/docs_cli_enterprise_subscription-management.md +55 -0
- package/.kiro/documentation/docs_cli_enterprise_supported-regions.md +39 -0
- package/.kiro/documentation/docs_cli_experimental.md +282 -0
- package/.kiro/documentation/docs_cli_experimental_checkpointing.md +439 -0
- package/.kiro/documentation/docs_cli_experimental_delegate.md +422 -0
- package/.kiro/documentation/docs_cli_experimental_knowledge-management.md +449 -0
- package/.kiro/documentation/docs_cli_experimental_tangent-mode.md +357 -0
- package/.kiro/documentation/docs_cli_experimental_thinking.md +331 -0
- package/.kiro/documentation/docs_cli_experimental_todo-lists.md +385 -0
- package/.kiro/documentation/docs_cli_hooks.md +207 -0
- package/.kiro/documentation/docs_cli_installation.md +235 -0
- package/.kiro/documentation/docs_cli_mcp.md +106 -0
- package/.kiro/documentation/docs_cli_mcp_configuration.md +294 -0
- package/.kiro/documentation/docs_cli_mcp_examples.md +273 -0
- package/.kiro/documentation/docs_cli_mcp_governance.md +436 -0
- package/.kiro/documentation/docs_cli_mcp_security.md +77 -0
- package/.kiro/documentation/docs_cli_migrating-from-q.md +129 -0
- package/.kiro/documentation/docs_cli_privacy-and-security.md +83 -0
- package/.kiro/documentation/docs_cli_privacy-and-security_compliance-validation.md +17 -0
- package/.kiro/documentation/docs_cli_privacy-and-security_data-protection.md +104 -0
- package/.kiro/documentation/docs_cli_privacy-and-security_firewalls.md +26 -0
- package/.kiro/documentation/docs_cli_privacy-and-security_infrastructure-security.md +10 -0
- package/.kiro/documentation/docs_cli_privacy-and-security_vpc-endpoints.md +41 -0
- package/.kiro/documentation/docs_cli_reference_built-in-tools.md +624 -0
- package/.kiro/documentation/docs_cli_reference_cli-commands.md +689 -0
- package/.kiro/documentation/docs_cli_reference_settings.md +294 -0
- package/.kiro/documentation/docs_cli_reference_slash-commands.md +559 -0
- package/.kiro/documentation/docs_cli_steering.md +84 -0
- package/.kiro/guides/AGENT_WORKFLOW_GUIDE.md +294 -0
- package/.kiro/guides/DEVLOG.md +882 -0
- package/.kiro/guides/IMPLEMENTATION_EXAMPLES.md +611 -0
- package/.kiro/guides/PIV Loop.md +122 -0
- package/.kiro/guides/PIV Loop.png +0 -0
- package/.kiro/guides/PIVLoop.png +0 -0
- package/.kiro/guides/QUICK_REFERENCE.md +202 -0
- package/.kiro/guides/README.md +149 -0
- package/.kiro/guides/advanced-patterns.md +514 -0
- package/.kiro/guides/agent-coordination.md +434 -0
- package/.kiro/guides/core-workflows.md +409 -0
- package/.kiro/guides/emergency-procedures.md +414 -0
- package/.kiro/guides/project-evaluation.md +534 -0
- package/.kiro/guides/quality-assurance.md +431 -0
- package/.kiro/guides/quick-start.md +235 -0
- package/.kiro/guides/troubleshooting.md +575 -0
- package/.kiro/guides/walkthroughs.md +711 -0
- package/.kiro/prompts/add-to-devlog.md +263 -0
- package/.kiro/prompts/code-review-fix.md +18 -0
- package/.kiro/prompts/code-review-hackathon.md +167 -0
- package/.kiro/prompts/code-review-security.md +454 -0
- package/.kiro/prompts/code-review.md +113 -0
- package/.kiro/prompts/create-prd.md +151 -0
- package/.kiro/prompts/execute-backend.md +257 -0
- package/.kiro/prompts/execute-frontend.md +438 -0
- package/.kiro/prompts/execute-logging.md +491 -0
- package/.kiro/prompts/execute-security.md +482 -0
- package/.kiro/prompts/execute-testing.md +528 -0
- package/.kiro/prompts/execute.md +101 -0
- package/.kiro/prompts/execution-report.md +72 -0
- package/.kiro/prompts/implement-fix.md +228 -0
- package/.kiro/prompts/plan-feature.md +433 -0
- package/.kiro/prompts/prime.md +73 -0
- package/.kiro/prompts/quality-metrics.md +622 -0
- package/.kiro/prompts/quickstart.md +318 -0
- package/.kiro/prompts/rca.md +220 -0
- package/.kiro/prompts/system-review.md +189 -0
- package/README.md +32 -0
- package/bin/cli.js +97 -0
- package/package.json +33 -0
|
@@ -0,0 +1,83 @@
|
|
|
1
|
+
# Privacy and security
|
|
2
|
+
Kiro is an AWS application that works as a standalone agentic IDE. Kiro's security framework is built around AWS's security infrastructure and follows practices to protect your development environment and data. Cloud security at AWS is the highest priority. As an AWS customer, you benefit from a data center and network architecture that is built to meet the requirements of the most security-sensitive organizations.
|
|
3
|
+
Security is a shared responsibility between AWS and you. The [shared responsibility model](https://aws.amazon.com/compliance/shared-responsibility-model/) describes this as security of the cloud and security in the cloud:
|
|
4
|
+
* Security of the cloud – AWS is responsible for protecting the infrastructure that runs AWS services in the AWS Cloud. AWS also provides you with services that you can use securely. Third-party auditors regularly test and verify the effectiveness of our security as part of the [AWS Compliance Programs](https://aws.amazon.com/compliance/programs/). To learn about the compliance programs that apply to Kiro, see [AWS Services in Scope by Compliance Program](https://aws.amazon.com/compliance/services-in-scope/).
|
|
5
|
+
* Security in the cloud – Your responsibility is determined by the AWS service that you use. You are also responsible for other factors including the sensitivity of your data, your company’s requirements, and applicable laws and regulations
|
|
6
|
+
|
|
7
|
+
|
|
8
|
+
This documentation helps you understand how to apply the shared responsibility model when using Kiro. It shows you how to configure Kiro to meet your security and compliance objectives. You also learn how to use other AWS services that help you to monitor and secure your Kiro resources.
|
|
9
|
+
## URL fetching[](https://kiro.dev/docs/cli/privacy-and-security/#url-fetching)
|
|
10
|
+
In the Kiro chat module, you can paste a specific URL for your device to fetch and use it as context to help Kiro answer your query or solve your task. You are responsible for the URL content that you fetch and ensuring that your use complies with any applicable third-party terms and laws.
|
|
11
|
+
## Autopilot versus supervised mode[](https://kiro.dev/docs/cli/privacy-and-security/#autopilot-versus-supervised-mode)
|
|
12
|
+
In Kiro, Autopilot is enabled by default. You can toggle between Autopilot and Supervised mode at any time. Autopilot mode enables the agent to execute code changes, such as creating, modifying, searching, and deleting files in your codebase and run commands that impact the filesystem.
|
|
13
|
+
### Autopilot mode[](https://kiro.dev/docs/cli/privacy-and-security/#autopilot-mode)
|
|
14
|
+
In Autopilot mode, Kiro works autonomously:
|
|
15
|
+
* Kiro executes multiple steps without requiring approval for each one
|
|
16
|
+
* Kiro makes decisions based on its understanding of your requirements
|
|
17
|
+
* You can toggle autopilot on/off in the chat interface
|
|
18
|
+
* You can interrupt autopilot at any time to regain manual control
|
|
19
|
+
|
|
20
|
+
|
|
21
|
+
### Supervised mode[](https://kiro.dev/docs/cli/privacy-and-security/#supervised-mode)
|
|
22
|
+
In supervised mode, Kiro works interactively with the user, requiring their approval and guidance at each step:
|
|
23
|
+
* Kiro suggests actions such as file creation, modification and deletion, but waits for user confirmation before proceeding
|
|
24
|
+
* Kiro asks clarifying questions when needed
|
|
25
|
+
* You can review and approve each generated document or code change, thus maintaining full control over the development process
|
|
26
|
+
|
|
27
|
+
|
|
28
|
+
When operating in either of these modes, you can view individual or all file changes made by the agent by selecting **View all changes** in the **Chat** module. Additionally, you can also select **Revert all changes** or revert to a [checkpoint](https://kiro.dev/docs/chat/checkpoints) to restore your files to their previous state in the filesystem locally.
|
|
29
|
+
## Trusted commands[](https://kiro.dev/docs/cli/privacy-and-security/#trusted-commands)
|
|
30
|
+
By default, Kiro requires approval before running any command. You can create your own trusted commands list by searching for **Kiro Agent: Trusted Commands** in your settings.
|
|
31
|
+
Kiro uses simple string prefix matching to determine if a command should be automatically trusted:
|
|
32
|
+
* **Exact matching** : Commands must match exactly (e.g., `npm install`)
|
|
33
|
+
* **Wildcard matching** : Use `*` to trust command variations (e.g., `npm *` trusts all npm commands)
|
|
34
|
+
* **Universal trust** : Use `*` alone to trust all commands (use with extreme caution)
|
|
35
|
+
|
|
36
|
+
|
|
37
|
+
The system treats entire commands as single strings and only checks if they start with trusted patterns. It does not analyze command structure, chains, or special characters, putting full responsibility on you to carefully configure trusted patterns.
|
|
38
|
+
## Best practices[](https://kiro.dev/docs/cli/privacy-and-security/#best-practices)
|
|
39
|
+
Kiro provides a number of security features to consider as you develop and implement your own security policies. The following best practices are general guidelines and don’t represent a complete security solution. Because these best practices might not be appropriate or sufficient for your environment, treat them as helpful considerations rather than prescriptions.
|
|
40
|
+
### Protecting your resources[](https://kiro.dev/docs/cli/privacy-and-security/#protecting-your-resources)
|
|
41
|
+
When using GitHub or Google authentication with Kiro, be aware that the Kiro agent operates within your local environment and may access:
|
|
42
|
+
* Local files and repositories
|
|
43
|
+
* Environment variables
|
|
44
|
+
* AWS credentials stored in your environment
|
|
45
|
+
* Other configuration files with sensitive information
|
|
46
|
+
|
|
47
|
+
|
|
48
|
+
### Recommendations[](https://kiro.dev/docs/cli/privacy-and-security/#recommendations)
|
|
49
|
+
1. **Workspace Isolation**
|
|
50
|
+
* Keep sensitive projects in separate workspaces
|
|
51
|
+
* Use .gitignore to prevent access to sensitive files
|
|
52
|
+
* Consider using workspace trust features in your IDE
|
|
53
|
+
2. **Use a Clean Environment**
|
|
54
|
+
* Consider creating a dedicated user account or container environment for Kiro
|
|
55
|
+
* Limit access to only the repositories and resources needed for your current project
|
|
56
|
+
3. **Manage AWS Credentials Carefully**
|
|
57
|
+
* Use temporary credentials with appropriate permissions
|
|
58
|
+
* Consider using AWS named profiles to isolate Kiro's access
|
|
59
|
+
* For sensitive work, remove AWS credentials from your environment when not needed
|
|
60
|
+
4. **Repository Access Control**
|
|
61
|
+
* When using GitHub authentication, review which repositories Kiro can access
|
|
62
|
+
* Use repository-specific access tokens when possible
|
|
63
|
+
* Regularly audit access permissions
|
|
64
|
+
|
|
65
|
+
|
|
66
|
+
## Remote extensions security[](https://kiro.dev/docs/cli/privacy-and-security/#remote-extensions-security)
|
|
67
|
+
**Warning**
|
|
68
|
+
**Security Note** : Using remote extensions opens a connection between your local machine and the remote machine. Only connect to secure remote machines that you trust and that are owned by a party whom you trust. A compromised remote could use the connection to execute code on your local machine. Third-party extensions including remote extensions are not developed, maintained, or managed by Kiro. We are not responsible for third-party extensions and cannot guarantee their stability, compatibility, or ongoing support.
|
|
69
|
+
Kiro supports Open VSX extensions, including remote SSH extensions (the community-maintained [Open Remote - SSH](https://open-vsx.org/extension/jeanp413/open-remote-ssh) extension on Open VSX is a popular choice), to provide a familiar development experience. For comprehensive information about extension compatibility and support in Kiro, see our [extension compatibility guide](https://kiro.dev/docs/guides/migrating-from-vscode/#extension-compatibility).
|
|
70
|
+
By following these practices, you can enjoy Kiro's capabilities while maintaining appropriate security boundaries for your development environment.
|
|
71
|
+
Page updated: December 12, 2025
|
|
72
|
+
[Concepts](https://kiro.dev/docs/cli/enterprise/concepts/)
|
|
73
|
+
[Data protection](https://kiro.dev/docs/cli/privacy-and-security/data-protection/)
|
|
74
|
+
On this page
|
|
75
|
+
* [URL fetching](https://kiro.dev/docs/cli/privacy-and-security/#url-fetching)
|
|
76
|
+
* [Autopilot versus supervised mode](https://kiro.dev/docs/cli/privacy-and-security/#autopilot-versus-supervised-mode)
|
|
77
|
+
* [Autopilot mode](https://kiro.dev/docs/cli/privacy-and-security/#autopilot-mode)
|
|
78
|
+
* [Supervised mode](https://kiro.dev/docs/cli/privacy-and-security/#supervised-mode)
|
|
79
|
+
* [Trusted commands](https://kiro.dev/docs/cli/privacy-and-security/#trusted-commands)
|
|
80
|
+
* [Best practices](https://kiro.dev/docs/cli/privacy-and-security/#best-practices)
|
|
81
|
+
* [Protecting your resources](https://kiro.dev/docs/cli/privacy-and-security/#protecting-your-resources)
|
|
82
|
+
* [Recommendations](https://kiro.dev/docs/cli/privacy-and-security/#recommendations)
|
|
83
|
+
* [Remote extensions security](https://kiro.dev/docs/cli/privacy-and-security/#remote-extensions-security)
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
# Compliance validation for Kiro
|
|
2
|
+
To learn whether an AWS service is within the scope of specific compliance programs, see [AWS services in Scope by Compliance Program](https://aws.amazon.com/compliance/services-in-scope/) and choose the compliance program that you are interested in. For general information, see [AWS Compliance Programs](https://aws.amazon.com/compliance/programs/).
|
|
3
|
+
You can download third-party audit reports using AWS Artifact. For more information, see [Downloading Reports in AWS Artifact](https://docs.aws.amazon.com/artifact/latest/ug/downloading-documents.html). If you are signing in to Kiro with GitHub or Google, you will not be able to download third-party audit reports using AWS Artifact.
|
|
4
|
+
Your compliance responsibility when using AWS services is determined by the sensitivity of your data, your company's compliance objectives, and applicable laws and regulations. AWS provides the following resources to help with compliance:
|
|
5
|
+
* [Security Compliance & Governance](https://aws.amazon.com/solutions/security/security-compliance-governance/) – These solution implementation guides discuss architectural considerations and provide steps for deploying security and compliance features.
|
|
6
|
+
* [HIPAA Eligible Services Reference](https://aws.amazon.com/compliance/hipaa-eligible-services-reference/) – Lists HIPAA eligible services. Not all AWS services are HIPAA eligible.
|
|
7
|
+
* [AWS Compliance Resources](https://aws.amazon.com/compliance/resources/) – This collection of workbooks and guides might apply to your industry and location.
|
|
8
|
+
* [AWS Customer Compliance Guides](https://d1.awsstatic.com/whitepapers/compliance/AWS_Customer_Compliance_Guides.pdf) in the _AWS Config Developer Guide_ – Understand the shared responsibility model through the lens of compliance. The guides summarize the best practices for securing AWS services and map the guidance to security controls across multiple frameworks (including National Institute of Standards and Technology (NIST), Payment Card Industry Security Standards Council (PCI), and International Organization for Standardization (ISO)).
|
|
9
|
+
* [Evaluating Resources with Rules](https://docs.aws.amazon.com/config/latest/developerguide/evaluate-config.html) – The AWS Config service assesses how well your resource configurations comply with internal practices, industry guidelines, and regulations.
|
|
10
|
+
* [AWS Security Hub](https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html) – This AWS service provides a comprehensive view of your security state within AWS. Security Hub uses security controls to evaluate your AWS resources and to check your compliance against security industry standards and best practices. For a list of supported services and controls, see [Security Hub controls reference](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-controls-reference.html).
|
|
11
|
+
* [Amazon GuardDuty](https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html) – This AWS service detects potential threats to your AWS accounts, workloads, containers, and data by monitoring your environment for suspicious and malicious activities. GuardDuty can help you address various compliance requirements, like PCI DSS, by meeting intrusion detection requirements mandated by certain compliance frameworks.
|
|
12
|
+
* [AWS Audit Manager](https://docs.aws.amazon.com/audit-manager/latest/userguide/what-is.html) – This AWS service helps you continuously audit your AWS usage to simplify how you manage risk and compliance with regulations and industry standards.
|
|
13
|
+
|
|
14
|
+
|
|
15
|
+
Page updated: November 12, 2025
|
|
16
|
+
[Data protection](https://kiro.dev/docs/cli/privacy-and-security/data-protection/)
|
|
17
|
+
[Infrastructure security](https://kiro.dev/docs/cli/privacy-and-security/infrastructure-security/)
|
|
@@ -0,0 +1,104 @@
|
|
|
1
|
+
# Data protection
|
|
2
|
+
The AWS [shared responsibility model](https://aws.amazon.com/compliance/shared-responsibility-model/) applies to data protection in Kiro. As described in this model, AWS is responsible for protecting the global infrastructure that runs all of the AWS Cloud. You are responsible for maintaining control over your content that is hosted on this infrastructure. You are also responsible for the security configuration and management tasks for the AWS services that you use. For more information about data privacy, see the [Data Privacy FAQ](https://aws.amazon.com/compliance/data-privacy-faq/).
|
|
3
|
+
## Data storage[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#data-storage)
|
|
4
|
+
Kiro stores your questions, its responses, and additional context, such as code, to generate new responses to your requests. For information about how data is encrypted, see [Data encryption](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#data-encryption). For information about how AWS may use some questions that you ask Kiro and its responses to improve our services, see [Kiro service improvement](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#service-improvement).
|
|
5
|
+
### AWS regions where content is stored and processed[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#aws-regions-where-content-is-stored-and-processed)
|
|
6
|
+
If you are a Kiro Free Tier user or a Kiro individual subscriber, your content, such as prompts and responses, will be stored in the US East (N. Virginia) Region.
|
|
7
|
+
If you are a [Kiro enterprise user](https://kiro.dev/docs/cli/enterprise/concepts/#kiro-enterprise-user), your content will be stored in the AWS Region where your Kiro profile was created.
|
|
8
|
+
With cross-region inferencing, your content may be processed in a different Region within the geography where your content is stored. For more information, see [Cross-region processing](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#cross-region-processing).
|
|
9
|
+
## Cross-region processing[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#cross-region-processing)
|
|
10
|
+
The following sections describe how cross-region inference and cross-region calls are used to provide the Kiro service.
|
|
11
|
+
### Cross-region inference[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#cross-region-inference)
|
|
12
|
+
Kiro is powered by Amazon Bedrock, and uses cross-region inference to distribute traffic across different AWS Regions to enhance large language model (LLM) inference performance and reliability. With cross-region inference, you get increased throughput and resilience during high demand periods, as well as improved performance.
|
|
13
|
+
Cross region inference doesn’t affect where your data is stored. For information on where data is stored when you use Kiro, see [AWS Regions where content is stored and processed](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#aws-regions-where-content-is-stored-and-processed).
|
|
14
|
+
### Supported regions for Kiro cross-region inference[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#supported-regions-for-kiro-cross-region-inference)
|
|
15
|
+
For models or capabilities under the experimental tag, see “[Global cross-region inference for experimental features](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#global-cross-region-inference-for-experimental-features)”.
|
|
16
|
+
Supported Kiro geography | Inference regions
|
|
17
|
+
---|---
|
|
18
|
+
United States |
|
|
19
|
+
* US East (N. Virginia) (`us-east-1`)
|
|
20
|
+
* US West (Oregon) (`us-west-2`)
|
|
21
|
+
* US East (Ohio) (`us-east-2`)
|
|
22
|
+
|
|
23
|
+
|
|
24
|
+
Europe |
|
|
25
|
+
* Europe (Frankfurt) (`eu-central-1`)
|
|
26
|
+
* Europe (Ireland) (`eu-west-1`)
|
|
27
|
+
* Europe (Paris) (`eu-west-3`)
|
|
28
|
+
* Europe (Stockholm) (`eu-north-1`)
|
|
29
|
+
* Europe (Milan) (`eu-south-1`)
|
|
30
|
+
* Europe (Spain) (`eu-south-2`)
|
|
31
|
+
|
|
32
|
+
|
|
33
|
+
### Global cross-region inference for experimental features[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#global-cross-region-inference-for-experimental-features)
|
|
34
|
+
Kiro may introduce new models and capabilities under an experimental tag, which process data differently than in the table above. When a model is launched as experimental, Kiro may use global cross-region inference to improve performance, increase throughput, and take advantage of available capacity across supported commercial AWS Regions worldwide. Global cross-region inference applies only to models and features explicitly designated as experimental.
|
|
35
|
+
For models and capabilities marked as experimental:
|
|
36
|
+
* Inference requests may be processed in multiple AWS Regions globally, including Regions outside the one associated with your Kiro profile.
|
|
37
|
+
* The Region where your data is stored is not affected by global cross-region inference.
|
|
38
|
+
* This global routing is used to optimize resource availability and allow consistent performance for experimental model launches.
|
|
39
|
+
|
|
40
|
+
|
|
41
|
+
## Data encryption[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#data-encryption)
|
|
42
|
+
This topic provides information specific to Kiro about encryption in transit and encryption at rest.
|
|
43
|
+
### Encryption in transit[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#encryption-in-transit)
|
|
44
|
+
All communication between customers and Kiro and between Kiro and its downstream dependencies is protected using TLS 1.2 or higher connections.
|
|
45
|
+
### Encryption at rest[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#encryption-at-rest)
|
|
46
|
+
Kiro encrypts your data using AWS owned encryption keys from AWS Key Management Service (AWS KMS). You don’t have to take any action to protect the AWS managed keys that encrypt your data. For more information, see [AWS owned keys](https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-owned-cmk) in the _AWS Key Management Service Developer Guide_.
|
|
47
|
+
When you subscribe with Kiro enterprise, administrators have the option to create customer managed keys to encrypt your data. Customer managed keys are KMS keys in your AWS account that you create, own, and manage to directly control access to your data by controlling access to the KMS key. Only symmetric keys are supported. For information on creating your own KMS key, see [Creating keys](https://docs.aws.amazon.com/kms/latest/developerguide/create-keys.html) in the _AWS Key Management Service Developer Guide_.
|
|
48
|
+
To set up a customer managed key to encrypt data as a Kiro enterprise administrator, you need permissions to use AWS KMS. The required KMS permissions are included in the [example IAM policy](https://kiro.dev/docs/cli/privacy-and-security/data-protection/). After creating a customer managed KMS key, you must provide the key in the Kiro console to use it to encrypt data.
|
|
49
|
+
## Service improvement[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#service-improvement)
|
|
50
|
+
To help Kiro provide the most relevant information, we may use certain content from Kiro, such as questions that you ask Kiro, other inputs you provide, and the responses and code that Kiro generates, for service improvement. This page explains what content we use and how to opt out.
|
|
51
|
+
### Kiro content used for service improvement[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#kiro-content-used-for-service-improvement)
|
|
52
|
+
We may use certain content from Kiro Free Tier and Kiro individual subscribers for service improvement. Users that have a paid Kiro subscription and access it through a social login provider (like GitHub or Google) or through AWS Builder ID are considered _individual subscribers_. Content that Kiro may use for service improvement includes, for example, your questions to Kiro, other inputs you provide, and the responses and code that Kiro generates. Kiro may use this content, for example, to provide better responses to common questions, fix Kiro operational issues, for de-bugging, or for model training.
|
|
53
|
+
We do not use content from [Kiro enterprise users](https://kiro.dev/docs/cli/enterprise/concepts/#kiro-enterprise-user) for service improvement.
|
|
54
|
+
**Info**
|
|
55
|
+
If you have an Amazon Q Developer Pro subscription and access Kiro through your AWS account with the Amazon Q Developer Pro subscription, then Kiro will not use your content for service improvement.
|
|
56
|
+
## Opt out of data sharing[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#opt-out-of-data-sharing)
|
|
57
|
+
By default, Kiro collects usage data, errors, crash reports, and other metrics as well as content for service improvement from Kiro Free Tier users and Kiro individual subscribers. This section explains how to opt out of sharing your data in Kiro for Kiro Free Tier and Kiro individual subscribers. For information on how Kiro uses this data, see [Kiro service improvement](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#service-improvement).
|
|
58
|
+
[Kiro enterprise users](https://kiro.dev/docs/cli/enterprise/concepts/#kiro-enterprise-user) are automatically opted out of telemetry and content collection by AWS. Telemetry collection settings for [user activity reports](https://kiro.dev/docs/cli/enterprise/monitor-and-track/user-activity/) are controlled by the administrator in the Kiro console and cannot be configured by Kiro enterprise users. For more information, see [Kiro enterprise settings](https://kiro.dev/docs/cli/enterprise/settings).
|
|
59
|
+
### Opting out of sharing data in the IDE[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#opting-out-of-sharing-data-in-the-ide)
|
|
60
|
+
To opt out of sharing your client-side telemetry and content in the Kiro IDE, use this procedure:
|
|
61
|
+
1. Open **Settings** in Kiro.
|
|
62
|
+
2. Switch to the **User** sub-tab.
|
|
63
|
+
3. Choose **Application** , and then choose **Telemetry and Content**.
|
|
64
|
+
4. To opt out of telemetry collection, uncheck the box for **Data Sharing and Prompt Logging: Usage Analytics And Performance Metrics**. To opt out of content collection, uncheck the box for **Data Sharing and Prompt Logging: Content Collection for Service Improvement**.
|
|
65
|
+
|
|
66
|
+
|
|
67
|
+
### Opting out of sharing data in the CLI[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#opting-out-of-sharing-data-in-the-cli)
|
|
68
|
+
To opt out of sharing your client-side telemetry and content in the Kiro CLI, use this procedure:
|
|
69
|
+
1. Open **Preferences** in the Kiro CLI application.
|
|
70
|
+
2. To opt out of telemetry collection, toggle off the **Telemetry** setting. To opt out of content collection, toggle off the **Share Kiro content with AWS** setting.
|
|
71
|
+
|
|
72
|
+
|
|
73
|
+
## Types of telemetry collected[](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#types-of-telemetry-collected)
|
|
74
|
+
* **Usage data** — Information such as the Kiro version, operating system (Windows, Linux, or macOS), and the anonymous machine ID.
|
|
75
|
+
* **Performance metrics** — The request count, errors, and latency for various features:
|
|
76
|
+
* Login
|
|
77
|
+
* Tab completion
|
|
78
|
+
* Code generation
|
|
79
|
+
* Steering
|
|
80
|
+
* Hooks
|
|
81
|
+
* Spec generation
|
|
82
|
+
* Tools
|
|
83
|
+
* MCP
|
|
84
|
+
|
|
85
|
+
|
|
86
|
+
Page updated: November 24, 2025
|
|
87
|
+
[Privacy and security](https://kiro.dev/docs/cli/privacy-and-security/)
|
|
88
|
+
[Compliance validation](https://kiro.dev/docs/cli/privacy-and-security/compliance-validation/)
|
|
89
|
+
On this page
|
|
90
|
+
* [Data storage](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#data-storage)
|
|
91
|
+
* [AWS regions where content is stored and processed](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#aws-regions-where-content-is-stored-and-processed)
|
|
92
|
+
* [Cross-region processing](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#cross-region-processing)
|
|
93
|
+
* [Cross-region inference](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#cross-region-inference)
|
|
94
|
+
* [Supported regions for Kiro cross-region inference](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#supported-regions-for-kiro-cross-region-inference)
|
|
95
|
+
* [Global cross-region inference for experimental features](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#global-cross-region-inference-for-experimental-features)
|
|
96
|
+
* [Data encryption](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#data-encryption)
|
|
97
|
+
* [Encryption in transit](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#encryption-in-transit)
|
|
98
|
+
* [Encryption at rest](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#encryption-at-rest)
|
|
99
|
+
* [Service improvement](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#service-improvement)
|
|
100
|
+
* [Kiro content used for service improvement](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#kiro-content-used-for-service-improvement)
|
|
101
|
+
* [Opt out of data sharing](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#opt-out-of-data-sharing)
|
|
102
|
+
* [Opting out of sharing data in the IDE](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#opting-out-of-sharing-data-in-the-ide)
|
|
103
|
+
* [Opting out of sharing data in the CLI](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#opting-out-of-sharing-data-in-the-cli)
|
|
104
|
+
* [Types of telemetry collected](https://kiro.dev/docs/cli/privacy-and-security/data-protection/#types-of-telemetry-collected)
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
# Configuring a firewall, proxy server, or data perimeter for Kiro
|
|
2
|
+
If you're using a firewall, proxy server, or [data perimeter](https://aws.amazon.com/identity/data-perimeters-on-aws/), make sure to allowlist traffic to the following URLs and Amazon Resource Names (ARNs) so that Kiro works as expected.
|
|
3
|
+
## General urls to allowlist[](https://kiro.dev/docs/cli/privacy-and-security/firewalls/#general-urls-to-allowlist)
|
|
4
|
+
In the following URLs, replace:
|
|
5
|
+
* `idc-directory-id-or-alias` with your IAM Identity Center instance's directory ID or alias. For more information about IAM Identity Center, see [What is IAM Identity Center?](https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html) in the AWS IAM Identity Center User Guide.
|
|
6
|
+
* `sso-region` with the AWS Region where your IAM Identity Center instance is enabled.
|
|
7
|
+
|
|
8
|
+
URL | Purpose
|
|
9
|
+
---|---
|
|
10
|
+
<idc-directory-id-or-alias>.awsapps.com | Authentication
|
|
11
|
+
oidc.<sso-region>.amazonaws.com | Authentication
|
|
12
|
+
*.sso.<sso-region>.amazonaws.com | Authentication
|
|
13
|
+
*.sso-portal.<sso-region>.amazonaws.com | Authentication
|
|
14
|
+
*.aws.dev | Authentication
|
|
15
|
+
*.awsstatic.com | Authentication
|
|
16
|
+
*.console.aws.a2z.com | Authentication
|
|
17
|
+
*.sso.amazonaws.com | Authentication
|
|
18
|
+
<https://aws-toolkit-language-servers.amazonaws.com/>* | Kiro, language processing
|
|
19
|
+
<https://aws-language-servers.us-east-1.amazonaws.com/>* | Kiro, language processing
|
|
20
|
+
<https://client-telemetry.us-east-1.amazonaws.com> | Kiro, telemetry
|
|
21
|
+
cognito-identity.us-east-1.amazonaws.com | Kiro, telemetry
|
|
22
|
+
Page updated: November 16, 2025
|
|
23
|
+
[Infrastructure security](https://kiro.dev/docs/cli/privacy-and-security/infrastructure-security/)
|
|
24
|
+
[VPC endpoints (AWS PrivateLink)](https://kiro.dev/docs/cli/privacy-and-security/vpc-endpoints/)
|
|
25
|
+
On this page
|
|
26
|
+
* [General urls to allowlist](https://kiro.dev/docs/cli/privacy-and-security/firewalls/#general-urls-to-allowlist)
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
# Infrastructure security in Kiro
|
|
2
|
+
As a managed service, Kiro is protected by AWS global network security. For information about AWS security services and how AWS protects infrastructure, see [AWS Cloud Security](https://aws.amazon.com/security/). To design your AWS environment using the best practices for infrastructure security, see [Infrastructure Protection](https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/infrastructure-protection.html) in _Security Pillar AWS Well‐Architected Framework_. You use AWS published API calls to access Kiro through the network. Clients must support the following:
|
|
3
|
+
* Transport Layer Security (TLS). We require TLS 1.2 and recommend TLS 1.3.
|
|
4
|
+
* Cipher suites with perfect forward secrecy (PFS) such as DHE (Ephemeral Diffie-Hellman) or ECDHE (Elliptic Curve Ephemeral Diffie-Hellman). Most modern systems such as Java 7 and later support these modes.
|
|
5
|
+
|
|
6
|
+
|
|
7
|
+
Additionally, requests must be signed by using an access key ID and a secret access key that is associated with an IAM principal. Or you can use the [AWS Security Token Service](https://docs.aws.amazon.com/STS/latest/APIReference/welcome.html) (AWS STS) to generate temporary security credentials to sign requests.
|
|
8
|
+
Page updated: November 12, 2025
|
|
9
|
+
[Compliance validation](https://kiro.dev/docs/cli/privacy-and-security/compliance-validation/)
|
|
10
|
+
[Firewalls, proxies, and data perimeters](https://kiro.dev/docs/cli/privacy-and-security/firewalls/)
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
# Kiro and interface endpoints (AWS PrivateLink)
|
|
2
|
+
You can establish a private connection between your VPC and Kiro by creating an interface VPC endpoint. Interface endpoints are powered by [AWS PrivateLink](https://aws.amazon.com/privatelink/), a technology that enables you to privately access Kiro APIs without an internet gateway, NAT device, VPN connection, or AWS Direct Connect connection. Instances in your VPC don't need public IP addresses to communicate with Kiro APIs. Traffic between your VPC and Kiro does not leave the Amazon network.
|
|
3
|
+
Each interface endpoint is represented by one or more [Elastic Network Interfaces](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-eni.html) in your subnets.
|
|
4
|
+
For more information, see [Interface VPC endpoints (AWS PrivateLink)](https://docs.aws.amazon.com/vpc/latest/privatelink/create-interface-endpoint.html) in the Amazon VPC User Guide.
|
|
5
|
+
## Considerations for Kiro VPC endpoints[](https://kiro.dev/docs/cli/privacy-and-security/vpc-endpoints/#considerations-for-kiro-vpc-endpoints)
|
|
6
|
+
Before you set up an interface VPC endpoint for Kiro, ensure that you review [Interface endpoint properties and limitations](https://docs.aws.amazon.com/vpc/latest/privatelink/create-interface-endpoint.html#vpce-interface-limitations) in the Amazon VPC User Guide.
|
|
7
|
+
Kiro supports making calls to all of its API actions from your VPC, in the context of services that are configured to work with Kiro.
|
|
8
|
+
## Prerequisites[](https://kiro.dev/docs/cli/privacy-and-security/vpc-endpoints/#prerequisites)
|
|
9
|
+
Before you begin any of the procedures below, ensure that you have the following:
|
|
10
|
+
* An AWS account with appropriate permissions to create and configure resources.
|
|
11
|
+
* A VPC already created in your AWS account.
|
|
12
|
+
* Familiarity with AWS services, especially Amazon VPC and Kiro.
|
|
13
|
+
|
|
14
|
+
|
|
15
|
+
## Creating an interface VPC endpoint for Kiro[](https://kiro.dev/docs/cli/privacy-and-security/vpc-endpoints/#creating-an-interface-vpc-endpoint-for-kiro)
|
|
16
|
+
You can create a VPC endpoint for Kiro using either the Amazon VPC console or the AWS Command Line Interface (AWS CLI). For more information, see [Creating an interface endpoint](https://docs.aws.amazon.com/vpc/latest/privatelink/create-interface-endpoint.html#create-interface-endpoint) in the Amazon VPC User Guide.
|
|
17
|
+
Create the following VPC endpoints for Kiro using the following service names:
|
|
18
|
+
* com.amazonaws.us-east-1.q
|
|
19
|
+
* com.amazonaws.eu-central-1.q
|
|
20
|
+
* com.amazonaws.us-east-1.codewhisperer
|
|
21
|
+
|
|
22
|
+
|
|
23
|
+
**Info**
|
|
24
|
+
Kiro supports Amazon Q Developer profiles in the US East (N. Virginia) and Europe (Frankfurt) regions. Also, the Amazon CodeWhisperer endpoint (com.amazonaws.us-east-1.codewhisperer) is only supported in the US East (N. Virginia) Region.
|
|
25
|
+
If you enable private DNS for the endpoint, you can make API requests to Kiro using its default DNS name for the Region, for example, `q.us-east-1.amazonaws.com`.
|
|
26
|
+
For more information, see [Accessing a service through an interface endpoint](https://docs.aws.amazon.com/vpc/latest/privatelink/create-interface-endpoint.html#access-service-though-endpoint) in the Amazon VPC User Guide.
|
|
27
|
+
## Using an on-premises computer to connect to a Kiro endpoint[](https://kiro.dev/docs/cli/privacy-and-security/vpc-endpoints/#using-an-on-premises-computer-to-connect-to-a-kiro-endpoint)
|
|
28
|
+
This section describes the process of using an on-premises computer to connect to Kiro through a AWS PrivateLink endpoint in your AWS VPC.
|
|
29
|
+
1. [Create a VPN connection between your on-premises device and your VPC](https://docs.aws.amazon.com/vpn/latest/clientvpn-user/client-vpn-user-what-is.html).
|
|
30
|
+
2. [Create an interface VPC endpoint for Kiro](https://kiro.dev/docs/cli/privacy-and-security/vpc-endpoints/#creating-an-interface-vpc-endpoint-for-kiro).
|
|
31
|
+
3. [Set up an inbound Amazon Route 53 endpoint](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/routing-to-vpc-interface-endpoint.html). This will enable you to use the DNS name of your Kiro endpoint from your on-premises device.
|
|
32
|
+
|
|
33
|
+
|
|
34
|
+
Page updated: December 10, 2025
|
|
35
|
+
[Firewalls, proxies, and data perimeters](https://kiro.dev/docs/cli/privacy-and-security/firewalls/)
|
|
36
|
+
[CLI commands](https://kiro.dev/docs/cli/reference/cli-commands/)
|
|
37
|
+
On this page
|
|
38
|
+
* [Considerations for Kiro VPC endpoints](https://kiro.dev/docs/cli/privacy-and-security/vpc-endpoints/#considerations-for-kiro-vpc-endpoints)
|
|
39
|
+
* [Prerequisites](https://kiro.dev/docs/cli/privacy-and-security/vpc-endpoints/#prerequisites)
|
|
40
|
+
* [Creating an interface VPC endpoint for Kiro](https://kiro.dev/docs/cli/privacy-and-security/vpc-endpoints/#creating-an-interface-vpc-endpoint-for-kiro)
|
|
41
|
+
* [Using an on-premises computer to connect to a Kiro endpoint](https://kiro.dev/docs/cli/privacy-and-security/vpc-endpoints/#using-an-on-premises-computer-to-connect-to-a-kiro-endpoint)
|