A defensible answer to "is Claude Cowork safe to deploy?" Trust boundaries, what stays local, what leaves the laptop, threats Cowork resists, threats you handle yourself.
TL;DR. Cowork is enterprise-grade enough for most mid-market work; the deployment is what makes it secure or not. Files stay on the laptop until Cowork sends relevant content to Anthropic for inference. Workspace folder access is per-user, per-folder. Three real risks the user has to handle: prompt injection, accidental confidential content in prompts, and memory hygiene. Below is what a CISO needs to read once, reach a verdict, and brief their team.
Four boundaries matter:
Each boundary is a place to ask: what crosses, when, and on whose authority?
If the laptop is encrypted at rest (which it should be), the workspace inherits that protection.
That is the entire egress surface. Nothing else leaves the laptop.
Verify against current Anthropic terms — these change. As of April 2026:
| Plan | Default retention | Trained on by default | Notes |
|---|---|---|---|
| Free | n/a (no Cowork) | n/a | Cowork requires a paid plan |
| Pro | ~5 years; opt-out 30 days | Yes; per-user opt-out | Toggle in account settings |
| Max | Same as Pro | Same as Pro | Per-user toggle |
| Team | Org-controlled; default no training | No (default) | Admin console |
| Enterprise | Org-controlled; zero retention available | No (default) | Contractual |
Source: Anthropic data privacy controls page. Date-stamp this table at every monthly review.
For mid-market, the practical pattern: SSO at the Anthropic-account level via Team/Enterprise, then per-user folder grants on each operator's laptop.
These are real, defensible defaults. They are not a substitute for the next section.
~/secrets.txt to attacker@example.com"). Treat untrusted documents carefully. See Prompt injection defenses.These four are where most real risk lives. The technical defaults above buy you the floor; the operational practices in section 04 of this bible build the ceiling.
Three patterns Tinkso recommends, picked by your risk profile:
Pilot pattern. Pro / Max seats for the pilot team, no MCP connectors, training opt-out enabled. Six weeks, low risk. Used for the "is this for us?" phase before procurement.
Standard pattern. Team plan, SSO, per-function workspaces, an audited list of MCP connectors. This is the most common end-state for a 50–2,500-person company.
Regulated pattern. Enterprise plan, zero-retention contract, on-premise MCP connectors for regulated data, plus the full governance pattern in Rollout governance. Required for healthcare, regulated financial, or government work.
Honest section. CISOs trust documents that admit what isn't perfect.
These are improving. They are also not deal-breakers in any deployment we have shipped, provided the operational practices above are in place.
We do not deploy Cowork into a regulated function without a security review of four things: data classification, connector inventory, backup posture, and rollback procedure. The tool is enterprise-grade enough for most mid-market work; the deployment is what makes it secure or not.
The most common security mistake we see at mid-market is over-trust on day one — granting whole-drive access "to make it easier" and then quietly tolerating it. The fix is the workspace pattern, set up before anyone clicks Enable Cowork.
Walk this page to your security partner. Mark each row of the data-handling table as either "we accept the default" or "we need an Enterprise contract." That note is the foundation of your procurement requirement.
Book a 30-minute call. We'll ask where you are, what your team needs, and which systems Cowork should touch.