Loading image...Kiro
  • CLI
  • Enterprise
  • Pricing
DOWNLOADS
Loading image...Kiro
  1. Docs
  2. CLI
  3. Privacy and security
  4. Data protection

Data protection

On this page
  • Data storage
  • AWS regions where content is stored and processed
  • Cross-region processing
  • Cross-region inference
  • Supported regions for Kiro cross-region inference
  • Data encryption
  • Encryption in transit
  • Encryption at rest
  • Service improvement
  • Kiro content used for service improvement
  • Opt out of data sharing
  • Opting out of sharing data in the IDE
  • Opting out of sharing data in the CLI
  • Types of telemetry collected

Loading image...Kiro
Product
  • About Kiro
  • CLI
  • Pricing
  • Downloads
For
  • Enterprise
  • Startups
Resources
  • Documentation
  • Blog
  • Changelog
  • FAQs
  • Report a bug
  • Suggest an idea
  • Billing support
Social
Site TermsLicenseResponsible AI PolicyLegalPrivacy PolicyCookie Preferences

The AWS shared responsibility model applies to data protection in Kiro. As described in this model, AWS is responsible for protecting the global infrastructure that runs all of the AWS Cloud. You are responsible for maintaining control over your content that is hosted on this infrastructure. You are also responsible for the security configuration and management tasks for the AWS services that you use. For more information about data privacy, see the Data Privacy FAQ.

Data storage

Kiro stores your questions, its responses, and additional context, such as code, to generate new responses to your requests. For information about how data is encrypted, see Data encryption. For information about how AWS may use some questions that you ask Kiro and its responses to improve our services, see Kiro service improvement.

AWS regions where content is stored and processed

If you are a Kiro Free Tier user or a Kiro individual subscriber, your content, such as prompts and responses, will be stored in the US East (N. Virginia) Region.

If you are a Kiro enterprise user, your content will be stored in the AWS Region where your Kiro profile was created.

With cross-region inferencing, your content may be processed in a different Region within the geography where your content is stored. For more information, see Cross-region processing.

Cross-region processing

The following sections describe how cross-region inference and cross-region calls are used to provide the Kiro service.

Cross-region inference

Kiro is powered by Amazon Bedrock, and uses cross-region inference to distribute traffic across different AWS Regions to enhance large language model (LLM) inference performance and reliability. With cross-region inference, you get increased throughput and resilience during high demand periods, as well as improved performance.

Cross region inference doesn’t affect where your data is stored. For information on where data is stored when you use Kiro, see AWS Regions where content is stored and processed.

Supported regions for Kiro cross-region inference

Supported Kiro geographyInference regions
United States
  • US East (N. Virginia) (us-east-1)
  • US West (Oregon) (us-west-2)
  • US East (Ohio) (us-east-2)
  • Canada (Central) (ca-central-1)
Europe
  • Europe (Frankfurt) (eu-central-1)
  • Europe (Ireland) (eu-west-1)
  • Europe (Paris) (eu-west-3)
  • Europe (Stockholm) (eu-north-1)
  • Europe (Milan) (eu-south-1)
  • Europe (Spain) (eu-south-2)

Data encryption

This topic provides information specific to Kiro about encryption in transit and encryption at rest.

Encryption in transit

All communication between customers and Kiro and between Kiro and its downstream dependencies is protected using TLS 1.2 or higher connections.

Encryption at rest

Kiro encrypts your data using AWS owned encryption keys from AWS Key Management Service (AWS KMS). You don’t have to take any action to protect the AWS managed keys that encrypt your data. For more information, see AWS owned keys in the AWS Key Management Service Developer Guide.

When you subscribe with Kiro enterprise, administrators have the option to create customer managed keys to encrypt your data. Customer managed keys are KMS keys in your AWS account that you create, own, and manage to directly control access to your data by controlling access to the KMS key. Only symmetric keys are supported. For information on creating your own KMS key, see Creating keys in the AWS Key Management Service Developer Guide.

To set up a customer managed key to encrypt data as a Kiro enterprise administrator, you need permissions to use AWS KMS. The required KMS permissions are included in the example IAM policy. After creating a customer managed KMS key, you must provide the key in the Kiro console to use it to encrypt data.

Service improvement

To help Kiro provide the most relevant information, we may use certain content from Kiro, such as questions that you ask Kiro, other inputs you provide, and the responses and code that Kiro generates, for service improvement. This page explains what content we use and how to opt out.

Kiro content used for service improvement

We may use certain content from Kiro Free Tier and Kiro individual subscribers for service improvement. Users that have a paid Kiro subscription and access it through a social login provider (like GitHub or Google) or through AWS Builder ID are considered individual subscribers. Content that Kiro may use for service improvement includes, for example, your questions to Kiro, other inputs you provide, and the responses and code that Kiro generates. Kiro may use this content, for example, to provide better responses to common questions, fix Kiro operational issues, for de-bugging, or for model training.

We do not use content from Kiro enterprise users for service improvement.

Info

If you have an Amazon Q Developer Pro subscription and access Kiro through your AWS account with the Amazon Q Developer Pro subscription, then Kiro will not use your content for service improvement.

Opt out of data sharing

By default, Kiro collects usage data, errors, crash reports, and other metrics from all Kiro users and collects content for service improvement from Kiro Free Tier users and Kiro individual subscribers. This section explains how to opt out of sharing your data in Kiro for Kiro Free Tier and Kiro individual subscribers. For information on how Kiro uses this data, see Kiro service improvement.

Kiro enterprise users are automatically opted out of content collection. Telemetry collection settings are controlled by the administrator in the Kiro console and cannot be configured by Kiro enterprise users. For more information, see Kiro enterprise settings.

Opting out of sharing data in the IDE

To opt out of sharing your client-side telemetry and content in the Kiro IDE, use this procedure:

  1. Open Settings in Kiro.
  2. Switch to the User sub-tab.
  3. Choose Application, and then choose Telemetry and Content.
  4. To opt out of telemetry collection, uncheck the box for Data Sharing and Prompt Logging: Usage Analytics And Performance Metrics. To opt out of content collection, uncheck the box for Data Sharing and Prompt Logging: Content Collection for Service Improvement.

Opting out of sharing data in the CLI

To opt out of sharing your client-side telemetry and content in the Kiro CLI, use this procedure:

  1. Open Preferences in the Kiro CLI application.
  2. To opt out of telemetry collection, toggle off the Telemetry setting. To opt out of content collection, toggle off the Share Kiro content with AWS setting.

Types of telemetry collected

  • Usage data — Information such as the Kiro version, operating system (Windows, Linux, or macOS), and the anonymous machine ID.
  • Performance metrics — The request count, errors, and latency for various features:
    • Login
    • Tab completion
    • Code generation
    • Steering
    • Hooks
    • Spec generation
    • Tools
    • MCP
Page updated: November 16, 2025
Privacy and security
Compliance validation