Ingress Resources uses sub-processors to keep systems fast, secure, and reliable. These are the third-party vendors brought in to handle specific processing tasks—storage, analytics, caching, error monitoring, and more. They are part of the data chain. If you understand them, you understand the reliability of the platform you’re using. If you ignore them, you gamble with uptime, compliance, and privacy.
What are Ingress Resources Sub-Processors?
Sub-processors are specialized service providers contracted by Ingress Resources to handle certain types of data processing. Each sub-processor performs a defined role—whether hosting infrastructure, logging transactions, handling backups, or providing specialized API services. They operate under the terms of a data processing agreement to ensure compliance with regulations like GDPR, CCPA, and SOC 2 requirements.
Why they matter
Every sub-processor is an extension of the system that your data lives on. Their security posture becomes your security posture. Their performance affects your performance. When a critical workflow depends on them, knowing their identity, location, and jurisdiction is not optional—it’s core due diligence.
Transparency and control
Ingress Resources publishes a list of active sub-processors. Updates to this list often come with a defined notice period, giving customers time to review, audit, or object if necessary. This transparency is not just compliance—it’s trust, codified into operational discipline.