Capability Domains met by F5 Networks

Granular Access Control

F5 products allow for the granular access control of each request sent to a protected system to determine whether that request presents a threat to the system.

Each request can be granted or denied access based on:

  • User based attributes
  • Threat(s) detected in the request
  • Client type and posture


  • Cryptographic functions (SSL/TLS) can be enforced to meet the agency's requirements in a FIPS 140-2 certified manner

    These capabilities can be deployed in a NetOps fashion or using DevSecOps capabilities to protect traditional or kubernetes microservices based applications