Technical Artifacts¶
To ensure a smooth onboarding and authorization process, Game Warden requires a set of technical artifacts that describe your application's architecture, configuration, and operational requirements. These materials help the Second Front (2F) team understand how your system functions and how it should be deployed securely.
Note
- Submit diagrams and visuals in
.jpeg,.png, or.pdfformats. - Submit Dockerfiles in
.txtformat.
Required artifacts¶
Please prepare and submit the following:
- Authorization boundary diagram
- Product networking requirements
- Third-party software and services
- Application database requirements
- List of running containers
- Dockerfiles (
.txtformat) - Environment variable keys / secrets overview
- Helm charts or Docker Compose files (Helm preferred)
Info
Learn more about Supported Design Patterns and Architectures.
1. Authorization boundary diagram¶
Provide a visual diagram of your product’s architecture, clearly outlining all components that fall within and outside the Game Warden boundary. This includes internal services, external integrations, and system dependencies.
Your diagram must represent:
- Networking flows (ingress, egress, bidirectional traffic)
- Third-party software and services
- Databases and storage locations
For more guidance, see Authorization Boundary Diagrams.
2. Product networking requirements¶
List all network communication your product requires. Include:
- Ingress, egress, and bidirectional data flows
- IP addresses, ports, and protocols
- Annotations to clarify which flows apply to which services (if you have multiple apps)
Example
| Inbound | Outbound |
|---|---|
8.8.8.8:443 – datasource for XYZ |
103.92.44.2:3306 – MySQL DB for XYZ |
These data flows must also be visually represented in your Authorization Boundary Diagram.
3. Third-party software and services¶
List any external tools, APIs, services, or platforms your application integrates with—especially those not embedded directly in your codebase.
Example
- Application X consumes RabbitMQ traffic from a DISA IL4 environment
- Application X connects to GCCS-J at Scott AFB
- Application Y processes S3 uploads via Lambda trigger
These external services must be shown in your Authorization Boundary Diagram to accurately depict the system boundary.
4. Application database requirements¶
Describe your database usage and deployment needs:
- Type of database (e.g., MySQL, PostgreSQL, SQL-compatible)
- Where it’s hosted (internal container, managed cloud service, etc.)
- Data encryption, retention, or replication concerns
Example
App X uses a containerized MySQL database that stores user profiles. Data is encrypted at rest and compatible with any SQL backend.
Your database must also be represented in your Authorization Boundary Diagram.
5. Running containers¶
List all containers your application uses in production. This helps Game Warden validate your deployment structure and track dependencies during onboarding and scanning.
What to include:
- Each container name and associated image
- Deployment method (e.g., Kubernetes or Docker Swarm)
- Exposed ports
Example
| Name | Mode | Replicas | Image | Ports |
|---|---|---|---|---|
my_app |
Replicated | 1/1 | my_app:latest |
*:443 → 443 |
my_app_postgres |
Replicated | 1/1 | my_app_postgres:latest |
*:8100 → 8100 |
rabbitmq |
Replicated | 1/1 | docker.io/rabbitmq:latest |
*:5671 → 5671 |
These containers should also be reflected in your Authorization Boundary Diagram to ensure a complete view of deployed components.
6. Dockerfiles¶
Submit all Dockerfiles in .txt format. These help our team proactively review application dependencies, identify embedded software, and ensure adherence to best practices.
7. Environment variable keys and secrets¶
List all environment variable keys used by your application, along with their purpose or function. Do not include actual secrets or passwords.
What to include:
- Variable name (the “key”)
- Description of what it’s used for
Example
mysql_db_password: Authenticates DB access from the application
Important
Submit only keys and descriptions. Do not submit the actual values. Game Warden is not requesting secrets, only the structure of what your application expects.
8. Helm charts or Docker Compose files¶
Game Warden prefers Helm charts and uses an internal tool (Helminator) to generate required deployment artifacts. While Docker Compose files are accepted initially, customers are expected to transition to Helm during onboarding.
What to include:
- Complete Helm chart or Compose file
- Definitions of services, volumes, dependencies, ports, and protocols
Helm inputs should align with the structure and flow shown in your Authorization Boundary Diagram.
Note
If you’re not already using Helm, familiarize yourself with Kubernetes-based deployments prior to onboarding.