Browse the bible
Foundations
Getting started
Capabilities
Security & governance
Workflows
Prompt library
Rollout playbook
Troubleshooting
Reference
Security & governance

Claude Cowork audit and compliance — what you can prove

Honest audit posture for Claude Cowork. Compliance regime table (SOC2, GDPR, HIPAA, ISO, FedRAMP), what gets logged, what's missing for high-assurance audit.

Updated 2026-04-25Read 7 min

TL;DR. Cowork's audit story is workable for SOC 2, GDPR, UK GDPR, ISO 27001 and CCPA today; conditional for HIPAA (Enterprise BAA required) and PCI-DSS (don't put cardholder data through it); not yet generally available for FedRAMP. Per-action structured logging is improving but not at the level a SOX team would design from scratch — most mid-market customers fill the gap with cloud-sync version history and the workspace conventions in this section.

Compliance posture summary#

RegimeWorkable todayConditions
SOC 2 Type II (Anthropic)YesAnthropic publishes — review their report
GDPRYesEnterprise plan + DPA + DPO sign-off
UK GDPRYesSame as above
HIPAAConditionalEnterprise BAA required; PHI workflows reviewed case-by-case
ISO 27001YesAnthropic certified — review their certs
PCI-DSSConditionalDon't put cardholder data through Cowork
FedRAMPNot yetAnthropic on the path; not generally available
CCPA / CPRAYesStandard contract handles

Date-stamped late April 2026. Re-verify monthly — Anthropic's posture is moving forward, not back, but the specifics matter.

What gets logged today#

  • Account-level — login activity, plan changes, admin actions. Standard SaaS.
  • Workspace-level — folder grants and revokes.
  • Conversation-level — prompts and outputs are stored under the data retention policy you chose.
  • Action-level — Cowork's plan-then-act loop produces a plan and a result; the plan is in the conversation, but per-action structured logs are limited.

Honest assessment: per-action structured logging at audit-grade is improving but is not yet at the level a SOX team would design from scratch. If your auditors expect "Cowork action #4327 modified file X by user Y at timestamp Z, here is the cryptographic chain", that is not what Cowork emits today.

What's missing for high-assurance audit#

  • A first-class export of "who did what to which file when, via Cowork." The signal exists; the export is not turn-key.
  • Tamper-evident logs with a cryptographic chain.
  • Per-function, per-folder action logs in a queryable form.

For audit-grade evidence today, Tinkso clients use:

  • Cloud sync version history (OneDrive, Google Drive, Dropbox) for the file-edit trail. Keep at least 90 days; longer for regulated functions.
  • Workspace-level conventions (CLAUDE.md, scheduled-tasks.md) as documentation of intended behaviour.
  • An archive snapshot routine for long-term retention into immutable storage.

This combination is enough for most internal audits. For SOC 2 control activities, it satisfies the file-modification evidence ask without requiring Cowork-native audit infra that does not exist yet.

The mid-market posture#

Most mid-market customers do not need SOX 404 IT general controls applied to Cowork. They need:

  • A written acceptable-use policy.
  • A workspace folder policy (see Access & folder policy).
  • Cloud-sync versioning enabled with at least 90-day history.
  • A monthly governance review with documented attendees.

That is enough to satisfy most internal audit and SOC 2 control activities. Anything beyond is a function of your specific regulator, not of Cowork's defaults.

Highly regulated functions#

For HIPAA, financial controls audit, or anything where documentation is part of the regulatory product:

  • Use the Enterprise plan, not Pro / Max.
  • Sign a BAA where applicable.
  • Restrict regulated workflows to a separate workspace with stricter access controls.
  • Log connector-side activity at the source (e.g., Salesforce audit log) rather than relying on Cowork-side logs alone.

The pattern: the regulated tools you already have keep their authoritative logs; Cowork sits on top and inherits the trail. Do not try to make Cowork the system of record for audit.

The compliance review checklist#

A compact checklist to bring to a security review:

  1. Plan tier and DPA status
  2. Training opt-out posture
  3. Workspace folder policy in place
  4. Connector inventory and OAuth scopes documented
  5. Memory hygiene policy in place
  6. Backup and rollback procedures tested
  7. Joiner / mover / leaver process documented
  8. Incident response touchpoint named

Each item is binary — green or red — for the first cut. Yellows surface in the conversation, not on the checklist.

Tinkso's take#

Audit and compliance is where most mid-market projects stall — not because Cowork cannot be deployed safely, but because nobody has done the documentation. We bring a templated security review pack to every engagement so the conversation with internal audit takes one meeting, not three.

The temptation is to wait for Anthropic to ship better audit infra before deploying. The cost of waiting is real: every quarter spent waiting is a quarter the pilot function does not produce ROI. The right move is usually to deploy with the workarounds above and upgrade the audit posture as Anthropic upgrades the platform.

Try this#

Take the eight-item compliance review checklist above. Score each item: green / yellow / red. Bring the result to your next security review. The yellows are your work; the reds are your blocker conversation.

Need help applying this?

Book a 30-minute call. We'll ask where you are, what your team needs, and which systems Cowork should touch.

Last reviewed: 25 April 2026 · The Cowork Bible · Tinkso