For an AWS team standardizing on Kiro, the pattern is familiar: developers want to spin up infra on demand, but platform and security teams need control over what gets deployed, where, and under which guardrails. Without the right abstraction, this becomes ticket-driven "DevOps as a service," with long back-and-forth cycles every time someone wants a new SNS topic, ECS service, or Bedrock-backed microservice. AI-assisted IDEs like Kiro help developers author code faster, but they don't by themselves encode your AWS guardrails, environment conventions, or cost constraints.
StackGen is designed to close that gap: it lets platform engineers define reusable Terraform-based building blocks and governance policies once, then makes them safely consumable through Kiro as a Power. If you're already familiar with how StackGen's MCP server connects AI tools to your infrastructure lifecycle, the Kiro Power builds directly on that foundation.
The result is a Kiro experience where a developer can ask "deploy this as a notification service on AWS" and get a compliant, production-grade app stack, without needing to know VPC layouts, subnet IDs, or internal platform rules.
What StackGen enables: prompt to new cloud infrastructure resources in under 5 minutes.
From an AWS and Kiro user's perspective, StackGen is an infrastructure lifecycle management platform, with cutting-edge agentic workflows and configurable governance. In StackGen, platform teams model reusable infrastructure, policies, and environments that application developers can provision easily.
Key elements include:
StackGen's policies are designed to be enforced and remediated automatically, including via agents within Kiro. That enforcement capability is what makes it a natural fit as a backend to a Kiro Power: the agent can ask "what did I violate?" and "fix this plan to comply," then regenerate the appStack accordingly. For a deeper look at why governance matters as much as the code generation itself, see Why AI-Generated Infrastructure Without Governance Is a Risk.
Platform engineers define policies once in StackGen or import them via integration with tools such as Wiz, and those policies automatically apply to every appStack created, regardless of whether it was drawn in the UI, pushed through CI, or generated from Kiro.
Examples include:
When Kiro (via the StackGen Power) generates Terraform for a new AWS application, StackGen automatically runs those policies and returns any violations. The agent can then retrieve "current violations," adjust the appStack, and resubmit until there are no violations visible in the compliance dashboard as "no violations detected." This gives Kiro developers a "secure by default" experience: anything they deploy through StackGen already conforms to your AWS platform's rules. The same governance engine powers the StackGen + HCP Terraform integration for teams who want enterprise state management alongside it.
At the heart of StackGen's integration with Kiro is the concept of a resource pack — a hardened, reusable Terraform module encapsulating a particular infrastructure pattern. Platform engineers define and approve these resource packs in StackGen (for example, an "SNS fan-out notification service" or an "ECS Fargate microservice"), and then expose them to Kiro.
When prompted, the Kiro agent inspects the repository (reading Dockerfiles, server code, etc.), realizes it needs a notification service, and discovers a StackGen "SNS fan-out" resource pack it can reuse. Once the developer approves, the Power calls StackGen to:
For AWS Kiro users, this shifts infrastructure from "write Terraform by hand" to "compose from curated resource packs," without leaving the IDE. It lets developers benefit from platform engineering work-hardened modules, security guardrails, guardrails on Bedrock access, cost limits, while staying in a conversational, code-centric workflow. This pattern is also documented in detail in the StackGen MCP + Cursor walkthrough for teams already using that workflow.
A typical flow illustrating how Kiro and StackGen work together for AWS deployments:
This workflow gives developers an end-to-end path from code in Kiro to running AWS infrastructure under platform-defined guardrails, with minimal friction. It's the same principle described in our broader look at MCP servers as the missing piece in every platform engineer's toolchain.
StackGen's Kiro Power explicitly targets key overlapping personas in platform engineering, DevOps, and SRE, with the primary focus being on enhancing the platform engineering and application developer relationship.
For a broader view of the AI-powered tools across this space, see Top AI-Powered Tools for Infrastructure Management in 2026.
For existing or prospective Kiro customers, the StackGen Power provides three main advantages on AWS:
This combination has already drawn interest from joint customers, who use StackGen in production and also have a significant Kiro user base.
StackGen has finalized the StackGen Power and published it in the Kiro Powers Registry, which will make it discoverable directly from the Kiro IDE and on Kiro.dev. Check it out today — or explore the StackGen MCP Server page to see the full range of infrastructure lifecycle tools available to your team.