You must satisfy technical requirements to deploy applications securely and at scale onto the Game Warden platform. Ensure applications meet these specifications prior to contacting the Game Warden team.
Our team continually scans applications for security vulnerabilities, and you must resolve them per our Acceptance Baseline Criteria. You must regularly update your components to align with ATO security standards, ensuring they remain secure and compliant.
Applications must integrate with a DoD-approved authentication and authorization service.
Our team supports two Department of Defense (DoD)-approved services: Game Warden and Platform One.
You must have CACs, ECAs, or PIVs to access IL2+ applications.
You must navigate the DoD vetting process to secure either a Common Access Card (CAC) or a Federal Personal Identity Verification (PIV) card from a mission sponsor. You also may obtain an External Certification Authority (ECA) card from an approved third party.
Application data must adhere to classification limits.
Permitted data includes Controlled Unclassified Information (CUI), Personally Identifiable Information (PII), IL2, IL4, and IL5 along with data specific to the International Traffic in Arms Regulations (ITAR). Contact the Game Warden team for data associated with IL6, Special Access Programs (SAP), or Sensitive Compartmented Information (SCI).
To deploy to the IL4+ Staging (STG) and Production (PRD) environments, you must have a government contract.
You must maintain an active DoD contract to deploy into IL4 or IL5 (CUI). Only CAC/ECA/PIV card holders may access Game Warden in sensitive data classifications.
Applications will be associated with the .mil domain.
All applications will deploy under the Game Warden afwerx.dso.mil domain.
Guidance? The Game Warden team will work with you to ensure your product aligns with these technical requirements and, going forward, provide any necessary insight to help you launch your application. Contact us at Growth for additional information.