Blog
Table of Content
Implement Claude Cowork Securely
This article breaks down the threat model for Claude Cowork. We also include pertinent configurations you can set for Cowork and also if you choose not to use Cowork and only use the Chat functionality.
Specifically, we walk through the threat model in depth, break out our recommended tiers of functionality and corresponding configurations you can set to mitigate risks for each tier, and then walk through every configuration you can set for Claude Cowork and what that might mean for your business.
The Threat Model

For Claude Cowork, the range of threats is greater because of the amount of untrusted input and the amount of confidential data it has access to. It also has a range of actions it can take on your system, which increases the downstream risk of your system being manipulated.
For example, an untrusted plugin downloaded from the internet could manipulate Claude into following an attacker’s instructions. You can see an example from Claude Code here that demonstrates how that could lead to data exfiltration: Hijacking Claude Code via Injected Marketplace Plugins
Because Claude has access to local file systems, it can also exfiltrate files that you have. Here is an example of Claude Cowork being manipulated by external data into exfiltrating confidential data: Claude Cowork exfiltrates files
This could also lead to phishing. For example, an untrusted piece of content could convince a user into submitting their credentials - a form of social engineering attack that allows an attacker to manipulate the LLM into crafting contextually relevant queries to convince a user to share their credentials. Example here with Slack: Data Exfiltration from Slack via Indirect Prompt Injection
Ultimately, the best way to “secure” Claude Cowork against novel indirect prompt injection vulnerabilities stems across four layers:
[1] implementing binary restrictions on access to types of external data sources that Claude can access (e.g. disallowing Slack access),
[2] configuring restrictions on that data (e.g. permitting only organizational admins to add skills),
[3] configuring restrictions on the types of actions that Claude can take based on output (e.g. restrict sites Claude in Chrome can click on), and
[4] restrictions on the externally connected output surfaces (e.g preventing automated link previews in Slack)
However, Claude’s settings are a bit interesting – not every single one operates in isolation. For example, if an admin turns off the ability for users to upload skills, the organization and its users also lose the ability to leverage plugins. Below, we walk through different combinations of ways you can set up Claude Cowork - that have different tradeoffs between functionality and risk - accounting for what combinations are actually feasible given what settings can be on (or off) at the same time.
Configurations vs Functionality
Below are our recommended Tiers of Claude Cowork usage depending on your organization’s risk tolerance. Maximizing functionality requires risk tradeoffs depending on the threat model.
All “functionality” for Claude
Functionality | Tier 1 | Tier 2 | Tier 3 |
Work in a Local Folder | Y | Y | Y |
Skills | Y | Restricted | N |
Plugins | Y | Restricted | N |
Agentic Browsing | Y | Restricted | Restricted |
Web Search | Y | Y | Y |
Sandbox Network Access | Y | Restricted | N |
Desktop Extensions | Restricted | Restricted | N |
Web Extensions | Restricted | Restricted | N |
Interactive File Creation | Y | Y | Y |
Work with Projects | Y | Y | N |
Work with Ask Organization | Y | N | N |
Tier 1: Maximized functionality
In Tier 1, you get access to all of Claude Cowork’s functionality. However, this greatly increases the risk surface. Injections can come from Skills and Plugins that users upload, from local folders that contain untrusted data, web search, desktop and web extensions.
Note: Desktop extensions and web extensions are still ‘restricted’ in this tier, as they must be individually added by an organization.
There are some useful settings that you should turn on regardless, even if you want to maximize functionality:
For Claude Cowork:
Disable: Organization > Privacy Settings > Rate Chats
This allows people to rate Claude's responses and share that feedback with Anthropic. This does not affect functionality.
Enable: Organization > Cowork > Monitoring
Cowork supports OpenTelemetry (OTel) events for monitoring and observability. You can enable this for granular observability without impacting any functionality.
For Claude Chat (these settings do not apply to Claude Cowork):
Disable: Organization > Privacy Settings > Location Metadata
Allow Claude to use coarse location metadata (city/region) to improve product experiences for your team members.
Ultimately, these settings do not reduce your risk exposure to indirect prompt injection for Cowork. However, these configurations allow you to maximize functionality while avoiding some risks and enabling telemetry to gain observability.
Tier 2: Balancing functionality with risks
In tier two, functionality tradeoffs are balanced against risks, restricting control over connected resources to the organization-level where possible and limiting access to sensitive org-specific data. Claude can perform meaningful automation and file work using org-controlled tools and integrations. Prompt injection risk is managed by restricting untrusted data sources (user skills, plugins, unvetted domains) while keeping the org's approved toolset functional.
What's enabled:
Organization-vetted skills — org-approved skills can be used; users cannot upload their own
Organization-configured plugins — org-designated plugins auto-installed; users cannot add their own
Network egress (package managers only) — Claude can install packages for data analysis; additional approved domains can be allowlisted
Claude in Chrome — browser automation enabled for most sites, with an org-managed blocklist for sensitive sites
Desktop extensions — org-uploaded extensions available; allowlist controls what users can install
Web connectors — org-configured connectors available to team members
Public Projects — access to public projects prohibited, limiting injection risks
Ask Organization — allows access trusted org-specific data
Enable: Organization > Libraries > Skills > Cloud Code Executions and File Creation
Allow Claude to execute code on a server and create and edit docs, spreadsheets, presentations, PDFs, and data reports. Required for skills to be enabled. Available on web and desktop.
Cowork can perform most of these file creation capabilities locally, without cloud access. However, enabling this setting is a prerequisite to allowing the use of Skills and Plugins.
Disable: Organization > Libraries > Skills > Skills
Allow team members to upload skills. Requires 'Code execution and file creation' to be enabled to use. Skills might contain executable code. Team members should be careful when using skills from unknown sources.
Note: during testing, it was observed that built-in skills, already-uploaded skills, and organization-wide skills are not affected by this setting. During the testing, disabling this setting served to prevent users from adding their own plugins.
Configure: Organization > Libraries > Skills > Organization Skills
Manage skills that can be viewed and used by anyone in your organization.
Select skills that have been vetted by one’s organization and add them to the organization-wide skill list. Note that these skills will be accessible even if the general ‘Skills’ setting is disabled.
Configure: Organization > Libraries > Plugins
Allows organizations to designate plugins that will be blocked, automatically installed, or made optionally available to organization members.
Here, organizations should select plugins to set as ‘installed by default’ for users. As the disabled Organization > Libraries > Skills > Skills setting is a prerequisite to users adding their own plugins, plugins set to ‘Available for Install’ will not be visible to users.
Note: during testing, when organization-level plugins were installed by default for users, it was observed that the org-level plugins were installed but did not appear operable without Skills enabled. This contrasts with behavior for org-level skills which are accessible even when Skills is disabled. It appears likely that the ‘Skills’ setting is overloaded with an original definition (and note under the setting) relating to the ability for users to upload skills but new functionality uses the setting to gate access to all Plugins.
Enable: Organization > Capabilities > Code Execution > Allow Network Egress
Give Claude network access to install packages and libraries in order to perform advanced data analysis, custom visualizations, and specialized file processing. Monitor chats closely as this comes with security risks.
Then configure: Organization > Capabilities > Code Execution > Allow Network Egress > Domain Allowlist > Package Managers Only
Additionally add any approved domains the Cowork sandbox will need to access (e.g., to preview interactive content with external elements) to the ‘Additional allowed domains’ section.
Enable: Organization > Claude in Chrome > Enable for your Team
Allow team members to use the Claude in Chrome extension. Configure site permissions after enabling.
This enables the Claude in Chrome connector, which allows Claude to navigate and operate the user’s Chrome browser.
Set ‘Allow extension’: Organization > Claude in Chrome > Default for all sites > Allow/Deny Extension
This will configure Claude in Chrome so that sites are allowed by default, unless they are explicitly added to the ’Blocked sites’ list.
Configure: Organization > Claude in Chrome > Blocked Sites
Claude in Chrome cannot be used on these websites.
Add sensitive sites to the Blocked Sites list. It is recommended to block sites for which the user operates with a high level of privilege and sites that are likely to process highly sensitive data (e.g., password managers, billing pages for apps used in the organization, etc)
Note: during testing, the blocklist did not appear to restrict access.
Enable: Organization > Libraries > Connectors > Desktop > Custom Team Extensions
Upload extensions that are only visible to members of your organization.
This allows the use of organization-wide desktop extensions for one’s team. Add desktop extensions for use by one’s team here.
Configure: Organization > Libraries > Connectors > Desktop > Allowlist
Limit the extensions that your team can install on their desktop.
Via this allowlist, organizations should configure which desktop extensions they would like to allow. Note, ‘desktop extensions (DXT)’ are being renamed to MCP Bundles (MCPB)
Configure: Organization > Libraries > Connectors > Web
Control which connectors your team members have access to.
Use this menu to add web connectors for use within one’s organization.
Disable: Organization > Privacy Settings > Public Projects
All users in an organization can see and start chats in public projects.
This will prevent users from creating chats with Cowork that leverage data from public projects.
Enable: Organization > Capabilities > Data Sources > Ask Organization
Allow your team members to search across your organization's connected data sources and knowledge bases for more comprehensive results.
This will allow users to open Cowork chats based on trusted data from the Ask Organization interface. Note, in the real UI, this setting uses your organization name, e.x, “Ask PromptArmor”.
Here are relevant configurations for Claude Chat (does not apply to Cowork):
Disable: Organization > Privacy Settings > Location Metadata
The risk of Claude having user level metadata on location does not outweigh any benefits from localization; by turning it off, it allows users to determine when they want to share location level data (e.g. via the chat) rather than having it by default
Disable: Organization > Privacy Settings > Share chats
Sharing chats increases the risk of data exposure between users of different privileges (although sharing is restricted to within the same organization.
Disable: Organization > Privacy Settings > Share Chats That Use Connectors
Disallows people from sharing chats that use connectors with others in your org. Recipients will see Claude's response, but not the data from the connector. Sharing chats increases the risk of data exposure outside of your tenant.
Tier 3: Locked Down
Tier 3 prioritizes security above all else, disabling most dynamic or external-facing capabilities. Claude operates as a mostly self-contained assistant with no access to external data, executable code, or connected services. Prompt injection surface is minimal.
What's disabled:
Code execution and file creation (cloud) — no server-side code execution and file creation
Network egress — no package installs or external domain access from the sandbox
Skills — user-uploaded skills blocked
Plugins — user-uploaded plugins blocked
Web connectors and desktop extensions — no external service integrations
Claude in Chrome — no browser automation
Ask Organization — users cannot access or start chats based on data from ‘Ask Organization’
Public Projects — users cannot access or start chats in shared projects
What's enabled:
OTel monitoring — full observability with no functionality impact
Local Cowork operations remain available (file access and chat attachments are user-level controls, not disabled by default)
Here are relevant configurations for Cowork:
Disable: Organization > Privacy Settings > Rate Chats
This does not increase functionality, but increases the risk that some metadata or response feedback may be used by Anthropic to train their model
Enable: Organization > Privacy Settings > Public Projects
All users in an organization can see and start chats in public projects.This does not materially increase the risk.
Disable: Organization > Capabilities > Data Sources > Ask Organization
This turns off the ability for your team members to search across your organization's connected data sources and knowledge bases for more comprehensive results. Those connected data sources increase the risk of indirect prompt injections
Disable: Organization > Capabilities > Code Execution > Cloud Code Execution and File Creation
This setting allows Claude to execute code on a server and create and edit docs, spreadsheets, presentations, PDFs, and data reports. Required for skills to be enabled. Available on web and desktop. The setting is relevant as this must be toggled ‘on’ to enable skill uploads for Cowork.
Disable: Organization > Capabilities > Code Execution > Allow Network Egress
Give Claude network access to install packages and libraries in order to perform advanced data analysis, custom visualizations, and specialized file processing. Monitor chats closely as this comes with security risks.
Alternatively, if specific domains must be accessible from the Cowork sandbox, configure:
Enable: Organization > Capabilities > Code Execution > Allow Network Egress
Then configure: Organization > Capabilities > Code Execution > Allow Network Egress > Domain Allowlist > None
Additionally add any approved domains the Cowork sandbox will need to access (e.g., to preview interactive content with external elements) to the ‘Additional allowed domains’ section.
Enable: Organization > Cowork > Monitoring
Cowork supports OpenTelemetry (OTel) events for monitoring and observability. You can enable this for granular observability without impacting any functionality.
Configure: Organization > Libraries > Plugins
This allows you to block plugins for organization members.
Note: during testing, when organization-level plugins were installed by default for users, it was observed that the org-level plugins were installed but did not appear operable without Skills enabled. This contrasts with behavior for org-level skills which are accessible even when Skills is disabled. It appears likely that the ‘Skills’ setting is overloaded with an original definition (and note under the setting) relating to the ability for users to upload skills but new functionality uses the setting to gate access to all Plugins.
Configure: Organization > Libraries > Connectors > Web
Turn off connectors for your team members.
Configure: Organization > Libraries > Connectors > Desktop > Custom Team Extensions
Do not enable any extensions for members of your organization.
Enable: Organization > Libraries > Connectors > Desktop > Allowlist
Limit the extensions that your team can install on their desktop.
Disable: Organization > Libraries > Skills > Cloud Code Executions and File Creation
This allows Claude to execute code on a server and create and edit docs, spreadsheets, presentations, PDFs, and data reports. Required for skills to be enabled. Available on web and desktop.The setting is relevant as this must be toggled ‘on’ to enable skill uploads for Cowork.
Disable: Organization > Libraries > Skills > Skills
This allows team members to upload skills. Requires 'Code execution and file creation' to be enabled to use. Skills might contain executable code. Turning this off reduces this risk.
Note: during testing, it was observed that built-in skills, already-uploaded skills, and organization-wide skills are not affected by this setting. During the testing, disabling this setting served to prevent users from adding their own plugins.
Disable: Organization > Libraries > Skills > Organization Skills
Turn off organization skills for your organization.
Disable: [USER LEVEL SETTING] Cowork > New Chat > Work in a folder
Disallow users in Cowork from accessing and operating on the contents of a local directory.
Configure: [USER LEVEL SETTING] Cowork > New Chat > Plus Button
Disallow users in Cowork to add files and photos, include a Project, or select Connectors for the chat.
Disable: Organization > Claude in Chrome > Enable for your Team
Disallow team members from use the Claude in Chrome extension.
Set ‘Deny extension’: Organization > Claude in Chrome > Default for all sites > Allow/Deny Extension
Set deny to disallow Claude in Chrome for all sites.
Here are relevant configurations for Claude Chat (does not apply to Cowork):
Disable: Organization > Privacy Settings > Location Metadata
The risk of Claude having user level metadata on location does not outweigh any benefits from localization; by turning it off, it allows users to determine when they want to share location level data (e.g. via the chat) rather than having it by default
Disable: Organization > Privacy Settings > Share chats
Sharing chats increases the risk of data exposure between users of different privileges (although sharing is restricted to within the same organization.
Disable: Organization > Privacy Settings > Share Chats That Use Connectors
Disallows people from sharing chats that use connectors with others in your org. Recipients will see Claude's response, but not the data from the connector. Sharing chats increases the risk of data exposure outside of your tenant.
Disable: Organization > Capabilities > Data Sources > Web Search
This turns off web search for users in Claude Chat (note that this does NOT apply to Cowork. Web Search is always enabled for Cowork)
Disable: Organization > Capabilities > Data Sources > Interactive Content
Let Claude display maps, images, and other visual content using third-party services.This does not apply to Cowork
Disable: Organization > Capabilities > Artifacts > Enable Artifact Connectors
This turns off the ability for team members to work with artifacts that use data from external sources – as those external sources increase risk exposure to indirect prompt injections.
Disable: [USER LEVEL SETTING] Memory > Search and reference chats
Allow Claude to search for relevant details in past chats. Learn more.
Disable: [USER LEVEL SETTING] Memory > Generate memory from chat history
Allow Claude to remember relevant context from your chats. This setting controls memory for both chats and projects. Learn more.
All configurations, granularly

Organization > Privacy Settings > Rate Chats
Allow people to rate Claude's responses and share that feedback with Anthropic.
Applies to Cowork? Yes.
Organization > Privacy Settings > Share chats
Allow people to share chats with others in your org.
Applies to Cowork? No, there is no option to share Cowork chats.
Organization > Privacy Settings > Share Chats That Use Connectors
Allow people to share chats that use connectors with others in your org. Recipients will see Claude's response, but not the data from the connector.
Applies to Cowork? No, there is no option to share Cowork chats.
Organization > Privacy Settings > Location Metadata
Allow Claude to use coarse location metadata (city/region) to improve product experiences for your team members.
Applies to Cowork? No, testing indicates metadata is not passed to Cowork as context.
Organization > Privacy Settings > Public Projects
All users in an organization can see and start chats in public projects.
Applies to Cowork? Yes. Users can start a Cowork session based on projects.
Organization > Capabilities > Data Sources > Web Search
Turn on web search for your team members.
Applies to Cowork? No. Web search is always enabled for Cowork.
Organization > Capabilities > Data Sources > Interactive Content
Let Claude display maps, images, and other visual content using third-party services. Learn how your data is used
Applies to Cowork? No. Cowork does not display interactive inline content. Cowork creates files and supports an interactive viewer, which is a separate functionality.
Organization > Capabilities > Data Sources > Ask Organization
Allow your team members to search across your organization's connected data sources and knowledge bases for more comprehensive results.
Applies to Cowork? Yes. Users can start a Cowork session based on Ask Organization that carries organizational context to the Cowork session.
Organization > Capabilities > Artifacts > Enable Artifact Connectors
Let team members work with artifacts that use data from external sources. Learn more
Applies to Cowork? No. Cowork creates files and supports an interactive viewer, but these are not Artifacts.
Organization > Capabilities > Code Execution > Cloud Code Execution and File Creation
Allow Claude to execute code on a server and create and edit docs, spreadsheets, presentations, PDFs, and data reports. Required for skills to be enabled. Available on web and desktop.
Applies to Cowork? Somewhat. Cowork can natively perform most of these capabilities locally, but this is relevant because the setting must be toggled 'on' to enable skill uploads, which are applicable to Cowork.
Organization > Capabilities > Code Execution > Allow Network Egress
Give Claude network access to install packages and libraries in order to perform advanced data analysis, custom visualizations, and specialized file processing. Monitor chats closely as this comes with security risks.
Applies to Cowork? Yes.
Organization > Cowork > Enable for your Organization
Your network egress settings will apply. Cowork is a research preview—some enterprise features like audit logs, compliance API, and data exports are not currently available. Learn more about using Cowork safely
Applies to Cowork? Yes.
Organization > Cowork > Monitoring
Cowork supports OpenTelemetry (OTel) events for monitoring and observability. Cowork reuses Claude Code's OTel events schema via the Claude Agent SDK. Learn more
Applies to Cowork? Yes.
Organization > Libraries > Plugins
Allows organizations to designate plugins that will be blocked, automatically installed, or made optionally available to organization members.
Applies to Cowork? Yes.
Note: during testing, when organization-level plugins were installed by default for users, it was observed that the org-level plugins were installed but did not appear operable without Skills enabled. This contrasts with behavior for org-level skills which are accessible even when Skills is disabled. It appears likely that the 'Skills' setting is overloaded with an original definition (and note under the setting) relating to the ability for users to upload skills but new functionality uses the setting to gate access to all Plugins.
Organization > Libraries > Connectors > Web
Control which connectors your team members have access to.
Applies to Cowork? Yes.
Organization > Libraries > Connectors > Desktop > Custom Team Extensions
Upload extensions that are only visible to members of your organization.
Applies to Cowork? Yes.
Organization > Libraries > Connectors > Desktop > Allowlist
Limit the extensions that your team can install on their desktop.
Applies to Cowork? Yes.
Organization > Libraries > Skills > Cloud Code Executions and File Creation
Allow Claude to execute code on a server and create and edit docs, spreadsheets, presentations, PDFs, and data reports. Required for skills to be enabled. Available on web and desktop.
Applies to Cowork? Somewhat. Cowork can natively perform most of these capabilities locally, but this is relevant because the setting must be toggled 'on' to enable skill uploads, which are applicable to Cowork.
Organization > Libraries > Skills > Skills
Allow team members to upload skills. Requires 'Code execution and file creation' to be enabled to use. Skills might contain executable code. Team members should be careful when using skills from unknown sources.
Applies to Cowork? Yes. In order for skills to be uploaded, this setting must be enabled. In order for plugins to be used, this setting must be enabled. Note that built-in skills, already-uploaded skills, and organization-wide skills are not affected by this setting.
Note: during testing, it was observed that built-in skills, already-uploaded skills, and organization-wide skills are not affected by this setting. During the testing, disabling this setting served to prevent users from adding their own plugins.
Organization > Libraries > Skills > Organization Skills
Manage skills that can be viewed and used by anyone in your organization.
Applies to Cowork? Yes. Note that these skills will be accessible even if the general 'Skills' setting is disabled.
Cowork > New Chat > Work in a folder
Allows Cowork to access and operate on the contents of a local directory.
Cowork > New Chat > Plus Button
Allows users to add files and photos, include a Project, or select Connectors for the chat.
Cowork > New Chat > Model Selection
Allows users to select what model will be used for Cowork's response.
Organization > Claude in Chrome > Enable for your Team
Allow team members to use the Claude in Chrome extension. Configure site permissions after enabling.
Applies to Cowork? Yes.
Organization > Claude in Chrome > Default for all sites > Allow/Deny Extension
Set default access for your team
Applies to Cowork? Yes.
Note: During testing, inconsistent behavior was observed from this setting.
Organization > Claude in Chrome > Allowed Sites/Blocked Sites
Claude in Chrome can/cannot (depending on whether the default is allow or deny) be used on these websites.
Applies to Cowork? Yes.
Note: During testing, inconsistent behavior was observed from this setting.
Notable User Level Items:
Memory > Search and reference chats
Allow Claude to search for relevant details in past chats. Learn more.
Applies to Cowork? No. Cowork cannot reference memories.
Memory > Generate memory from chat history
Allow Claude to remember relevant context from your chats. This setting controls memory for both chats and projects. Learn more.
Applies to Cowork? No. Cowork cannot create memories.