Loading...
  • Messages
  • Managed Agents
  • Admin
Search...
⌘K
First steps
OverviewQuickstartPrototype in Console
Define your agent
Agent setupToolsMCP connectorPermission policiesAgent Skills
Configure agent environment
Cloud environment setupCloud container reference
Integration guideSecurity model
Delegate work to your agent
Start a sessionSession event streamSubscribe to webhooksDefine outcomesAuthenticate with vaults
Manage agent context
Access GitHubAttach and download files
Advanced orchestration
Multiagent sessions
Working with files
Files APIPDF supportImages and vision
Skills
OverviewBest practicesSkills for enterprise
MCP
Remote MCP servers
Claude on cloud platforms
Claude Platform on AWS
Log in
Security model
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Solutions

  • AI agents
  • Code modernization
  • Coding
  • Customer support
  • Education
  • Financial services
  • Government
  • Life sciences

Partners

  • Amazon Bedrock
  • Google Cloud's Vertex AI

Learn

  • Blog
  • Courses
  • Use cases
  • Connectors
  • Customer stories
  • Engineering at Anthropic
  • Events
  • Powered by Claude
  • Service partners
  • Startups program

Company

  • Anthropic
  • Careers
  • Economic Futures
  • Research
  • News
  • Responsible Scaling Policy
  • Security and compliance
  • Transparency

Learn

  • Blog
  • Courses
  • Use cases
  • Connectors
  • Customer stories
  • Engineering at Anthropic
  • Events
  • Powered by Claude
  • Service partners
  • Startups program

Help and security

  • Availability
  • Status
  • Support
  • Discord

Terms and policies

  • Privacy policy
  • Responsible disclosure policy
  • Terms of service: Commercial
  • Terms of service: Consumer
  • Usage policy
Managed Agents/Self-hosted sandboxes

Security model

Shared responsibility model for self-hosted sandbox environments.

Anthropic secures the control plane across all environments: session and work queue integrity, multi-tenant isolation, and agent-context minimization. When you self-host, the following responsibilities fall to you.

What you own

  • Container image quality and runtime hardening. Anthropic does not inspect or verify your container image. Follow best practices such as dropping unnecessary Linux capabilities, running as a non-root user, and using a read-only root filesystem.
  • Network egress controls. Your container's network access is determined by your VPC and firewall rules. Without egress restrictions, a compromised tool execution can reach arbitrary external hosts. Restrict outbound traffic to only the endpoints your tools require.
  • Service key storage and rotation. The environment service key (ANTHROPIC_ENVIRONMENT_KEY) authorizes polling your environment's work queue and submitting results back to sessions. Store it in a secrets manager, not in environment files or container images. Rotate it immediately if you suspect exposure.
  • Isolating untrusted workloads. The environment service key is scoped to one environment's work queue. If you run untrusted code inside your container, consider provisioning a separate workspace and environment per trust boundary. This limits any one key's access to a single user's sessions rather than a shared pool.
  • Tool-execution blast radius. Tools run inside your container with whatever permissions your process has. Apply least privilege to the process user and mount only the directories your tools require.
  • Log retention and session content. Conversation content and tool outputs that your worker processes are in your environment. You are responsible for retaining, redacting, or deleting that data in compliance with your own policies. Anthropic has no visibility into what your worker does with session content once delivered.

What Anthropic cannot do for you

  • Revoke a leaked key faster than you can detect it. Anthropic can detect anomalous usage patterns, but cannot instantly invalidate a key. Treat ANTHROPIC_ENVIRONMENT_KEY like a database password: rotate it quickly if compromised.
  • Verify your worker build. Anthropic does not inspect your container image or runtime. A supply-chain compromise in your image is not detectable from the control plane.
  • Sandbox tools inside your container. Anthropic's security boundary stops at the container. How you isolate individual tool executions from each other inside that boundary is entirely your responsibility.
  • Enforce data retention in your environment. Once session content reaches your worker, it is outside Anthropic's data lifecycle controls.

Was this page helpful?

  • What you own
  • What Anthropic cannot do for you