18F authorizes access to its information systems based on a valid access authorization from system owners and DevOps, intended system usage within the 18F network environment, and other attributes as required by the organization or associated missions/business functions. This is documented within section 3 of 18F access control policy “Access Management”.
Applications and websites:
* Application system owners must ensure to authorize access to applications that require it by submitting a request through GitHub for approval by the 18F DevOps team.