The list is short, but every name matters. Ingress Resources sub-processors are the third-party services trusted to handle data flows, storage, and operational support. They sit behind the scenes of ingress pipelines, ensuring traffic reaches the right destination, securely and on time. Knowing who they are, what they do, and how they process data is critical for compliance, performance, and risk management.
Ingress Resources uses sub-processors to provide specialized capabilities that are faster to outsource than to build in-house. These can include DNS management, edge caching, metrics aggregation, logging infrastructure, and data residency enforcement. Each sub-processor operates under strict contractual terms designed to meet legal and security requirements.
A typical sub-processor list contains the service name, region of operation, and scope of work. The region matters for compliance with regulations like GDPR. Scope outlines the exact functions provided for ingress control: packet inspection, SSL termination, session routing, or API gateway support. Continuous monitoring ensures sub-processors maintain uptime guarantees and adhere to service-level agreements.