Sub-processors are third-party services that OPA or an OPA-powered solution uses to operate. They might store logs, host policy bundles, provide monitoring, or deliver build artifacts. Each one inherits access to portions of your infrastructure or policy metadata.
Why This Matters
When OPA enforces rules against Kubernetes clusters, APIs, or CI/CD pipelines, those enforcement points may call out to external systems. These systems—CDNs, artifact repositories, analytics tools—are sub-processors. If they fail, misconfigure, or get breached, your policy guarantees dissolve in practice. Transparent sub-processor lists let you track these dependencies.
Common OPA Sub-Processor Categories
- Policy Distribution Services: Host versioned policy bundles for download.
- Analytics & Logging Providers: Store enforcement data, audit logs, and decision inputs.
- Build & CI/CD Pipelines: Compile or test rego policies before deployment.
- Cloud Hosting Providers: Run OPA in managed containers or VMs.
Regulatory and Compliance Impact
Many compliance regimes—GDPR, SOC 2, ISO 27001—require full disclosure of all external entities processing data. If OPA sub-processors manage sensitive logs or configuration files, they fall under these rules. Keeping an updated inventory is part of due diligence.