Planview saves 40+ hours per audit cycle by automating SOC 2 compliance with Kiro CLI

By
ME

Medha Aiyah

Developer

KE

Keerthi Konjety

Developer

MU

Mukesh Belde

Planview

FA

Faizan Mansuri

Planview

Compliance management can sometimes feel overwhelming. For many engineering teams, it ends up requiring significant ongoing attention. Teams spend 40 or more hours per annual cycle collecting evidence, navigating cloud provider consoles, and compiling spreadsheets while audit deadlines approach.

Planview, a leader in strategic portfolio management serving over 3,000 customers globally, faced a familiar problem. Maintaining SOC 2 compliance across a multi-service AWS infrastructure consumed engineering time that could go toward building features for customers. Here’s how Planview transformed their compliance workflow with Kiro CLI and saved more than 40 hours per compliance cycle.

Compliance is hard

Here’s what compliance management looked like for Planview before Kiro:

  • Engineers collected evidence manually across more than 20 cloud services, pulling data from consoles and APIs.

  • Teams performed spreadsheet archaeology to track security controls, timestamps, and audit trails.

  • Audit prep cycles consumed 40+ hours, pulling engineers away from product development.

  • Coordination overhead spanned multiple team members with specialized knowledge of both the cloud provider and SOC 2 requirements.

Many engineering teams managing cloud compliance face similar challenges. Time spent auditing, context switching, the potential for manual errors, and the planning for the quarterly cycle compound the cost.

A different approach to compliance

Rather than building yet another compliance dashboard, Planview took a different path. They used Kiro to bring compliance automation directly into their development workflow with Kiro CLI.

Initially, Planview’s SOC 2 compliance process was entirely manual, requiring significant time and resources from their security and engineering teams. For streamlining compliance workstreams, the team evaluated commercial continuous compliance platforms in Q1 2025. Although Planview plans to adopt continuous compliance capabilities long-term, the team needed an interim solution that could deliver value quickly without the overhead of a full commercial platform. This need made Kiro a strong fit. Kiro integrated directly with Planview’s existing workflows and provided automation benefits right away, without closing the door on a full compliance platform later.

Creating a custom compliance agent in Kiro CLI

Planview used Kiro CLI’s inbuilt aws tool and custom agents feature to configure granular read access to cloud services. Custom agents in Kiro allow you to create purpose-built AI assistants with specific context and tool permissions tailored to your use case. For Planview, this meant creating an agent with pre-approved, read-only access to query cloud services and retrieve technical evidence relevant to their SOC 2 compliance workflows. Pre-approved means the agent does not require manual authorization for each read operation. This eliminates the need to manually grant permissions for each audit cycle or evidence collection task, transforming what was previously a 40+ hour manual process into an automated workflow. The integration operates with read-only, non-invasive access, ensuring your infrastructure remains secure and unchanged. This isn’t limited to compliance. For example, you could create a custom agent for infrastructure monitoring that queries CloudWatch metrics, S3 bucket configurations, and Lambda function logs, giving it pre-approved read access to AWS services to automatically generate operational health reports. Learn how to create custom agents and review configuration examples.

The following example is a reference to create a custom soc2-compliance agent JSON that is stored under ~/.kiro/agents/soc2-compliance.json. This can be leveraged as an assistant to help in the SOC 2 Compliance process and it can then be initiated using "kiro-cli --agent soc2-compliance (or your custom agent name) in the CLI.

Loading code example...

This JSON defines a specialized agent configuration designed to assist with security controls, audit preparation, and policy enforcement. Here’s what each section means:

  • name - The agent’s identifier/name

  • description - Human-readable explanation of the agent’s purpose (SOC 2 compliance work)

  • prompt - Path to a markdown file containing the agent’s system instructions/behavior (./prompts/soc2-expert.md)

  • tools - Tools the agent has access to:

    • read (in-built tool) - Read files/directories

    • write (in-built tool) - Create/modify files

    • aws (in-built tool) - Make AWS CLI calls

  • allowedTools - Tools that don’t require user approval (only read is auto-approved here; write and aws need confirmation)

  • toolsSettings - Fine-grained permissions for each tool:

    • write.allowedPaths - Agent can only write to these specific directories (compliance docs, policies, audit files, security files)

      • aws.allowedServices - Agent can only interact with these AWS services (IAM, CloudTrail, Config, GuardDuty, SecurityHub, Inspector, KMS, S3 - all security/compliance related)

  • aws.autoAllowReadonly - Read-only AWS operations (like describe-, list-, get-*) don’t require approval

  • resources - Files automatically loaded into the agent’s context when it starts:

    • Policy markdown files

    • Compliance documentation

    • Audit JSON files

    • Security control YAML files

Alternatively, rather than manually authoring the agent configuration JSON, you can use Kiro CLI’s /help agent, a built-in assistant that generates smart agent configuration recommendations from a natural language description. By running /help Help me create a custom agent for soc-2 compliance inside Kiro CLI, Kiro automatically produces a first draft for you to assist with SOC 2 compliance.

Loading image...terminal screenshot showing the output of running the help create a custom agent command: a json config file

Here’s what happens when you run /help Help me create a custom agent for soc-2 compliance

  1. Kiro switches to the built-in /help agent, purpose-built to answer questions about Kiro CLI and generate configurations on your behalf.

  2. The /help agent introspects Kiro's internal documentation to look up the correct agent configuration schema, ensuring the generated config uses valid fields and follows best practices.

  3. The /help agent produces a recommended config, including tools, permissions, resource patterns, and a tailored system prompt without requiring manual JSON authoring. You can refine this as needed.

Using your custom agent in Kiro CLI

When a developer launches this custom agent in the terminal with kiro-cli --tui --agent soc2-compliance, it loads the context and the permission for the “aws” tool with the allowedServices, resources and allowed paths when you initiate a chat session. It loads the new UX for Kiro CLI when you use the --tui flag . If you would like to use the regular kiro-cli terminal experience, you can use kiro-cli --classic --agent soc2-compliance or use /agent soc2-compliance from within the Kiro terminal.

Loading image...default state of Kiro CLI with soc2-compliance agent selected

Example prompt: “Generate a SOC 2 CC6.1 compliance report showing all S3 buckets with their encryption status, public access settings, and access logging configuration.”

Loading image...prompt in Kiro CLI with use_aws tool noting there are 34 buckets; each will be queried to get metadata

Using Kiro’s capabilities, Planview simplified the collection of timestamps for SOC 2 and ISO evidence. The system could now pull information with timestamps which allowed Kiro to automatically:

  • Query S3 configurations across all regions or create scripts that can help in running queries that produce the same results

  • Check encryption settings and key management

  • Verify access control lists and bucket policies

  • Generate formatted compliance evidence with timestamps

The agent handles the complexity and the team gets the evidence they need.

Note: It’s important to note that AI-generated compliance outputs are highly dependent on the specificity and scope of the prompts provided to the agent. This is a tool to accelerate the auditing process but should not be the replacement for any deterministic compliance tools. All AI-generated recommendations, policy text, and audit evidence should be reviewed and validated by qualified compliance professionals before being used in production environments or submitted to auditors.

Results

What used to require manual data gathering now happens automatically. Kiro pulls compliance evidence with timestamps, conducts security scans with AWS allowed services mentioned above, and organizes artifacts that align with specific SOC 2 and ISO control requirements. The workflow integrates with Planview’s existing processes without requiring changes to their development environment. Evidence collection that was previously manual now runs through Kiro CLI’s built-in tools, with a conversational interface for feedback. The Planview team noticed significant, measurable impact right away:

  • 40+ hours saved per compliance cycle. Time saved is now used in building customer value instead of collecting evidence.

  • 60% overall efficiency gain through automation, with the team responding 3-4x faster to audit requests.

  • 1 to 1.5 software development engineer (SDE) sprint time saved per team member, now redirected to features and enhancements.

  • On-demand evidence collection helps teams prepare for audits throughout the year rather than carve specific time for it.

But the real win here is that engineering resources are back where they belong, building products instead of compiling spreadsheets.

Conclusion

Planview’s approach demonstrates that compliance work doesn’t have to be a burden. You can provide compliance requirements as specifications and bring AI directly into your development workflow. Features like custom agents help you maintain your security standards while freeing your team to focus on delivering value to customers.

Planview is expanding their use of Kiro CLI’s custom agent for use cases beyond compliance management. This will enable more developers across the organization to use repeatable workflows and multiply the efficiency gains.

Get started with Kiro CLI today.