Kiro is an AWS application that works as a standalone agentic IDE. Kiro's security framework is built around AWS's security infrastructure and follows practices to protect your development environment and data. Cloud security at AWS is the highest priority. As an AWS customer, you benefit from a data center and network architecture that is built to meet the requirements of the most security-sensitive organizations.
Security is a shared responsibility between AWS and you. The shared responsibility model describes this as security of the cloud and security in the cloud:
Security of the cloud – AWS is responsible for protecting the infrastructure that runs AWS services in the AWS Cloud. AWS also provides you with services that you can use securely. Third-party auditors regularly test and verify the effectiveness of our security as part of the AWS Compliance Programs. To learn about the compliance programs that apply to Kiro, see AWS Services in Scope by Compliance Program.
Security in the cloud – Your responsibility is determined by the AWS service that you use. You are also responsible for other factors including the sensitivity of your data, your company’s requirements, and applicable laws and regulations
This documentation helps you understand how to apply the shared responsibility model when using Kiro. It shows you how to configure Kiro to meet your security and compliance objectives. You also learn how to use other AWS services that help you to monitor and secure your Kiro resources.
In the Kiro chat module, you can paste a specific URL for your device to fetch and use it as context to help Kiro answer your query or solve your task. You are responsible for the URL content that you fetch and ensuring that your use complies with any applicable third-party terms and laws.
In Kiro, Autopilot is enabled by default. You can toggle between Autopilot and Supervised mode at any time. Autopilot mode enables the agent to execute code changes, such as creating, modifying, searching, and deleting files in your codebase and run commands that impact the filesystem.
In Autopilot mode, Kiro works autonomously:
In supervised mode, Kiro works interactively with the user, requiring their approval and guidance at each step:
When operating in either of these modes, you can view individual or all file changes made by the agent by selecting View all changes in the Chat module. Additionally, you can also select Revert all changes or revert to a checkpoint to restore your files to their previous state in the filesystem locally.
By default, Kiro requires approval before running any command. You can create your own trusted commands list by searching for Kiro Agent: Trusted Commands in your settings.
Kiro uses simple string prefix matching to determine if a command should be automatically trusted:
npm install)* to trust command variations (e.g., npm * trusts all npm commands)* alone to trust all commands (use with extreme caution)The system treats entire commands as single strings and only checks if they start with trusted patterns. It does not analyze command structure, chains, or special characters, putting full responsibility on you to carefully configure trusted patterns.
Kiro provides a number of security features to consider as you develop and implement your own security policies. The following best practices are general guidelines and don’t represent a complete security solution. Because these best practices might not be appropriate or sufficient for your environment, treat them as helpful considerations rather than prescriptions.
When using GitHub or Google authentication with Kiro, be aware that the Kiro agent operates within your local environment and may access:
Kiro supports Open VSX extensions, including remote SSH extensions, to provide a familiar development experience. For comprehensive information about extension compatibility and support in Kiro, see our extension compatibility guide.
By following these practices, you can enjoy Kiro's capabilities while maintaining appropriate security boundaries for your development environment.
Privacy and security