F5 compliance



FAQs about trust and compliance at F5

All new hires including employees and contractors are required to undergo the security awareness training upon hire and annually thereafter. Additional periodic (quarterly, annually etc.) trainings also need to be completed by users depending by their roles and responsibilities. Examples of additional trainings includes - secure development lifecycle training, global data privacy training, Data classification, Vulnerability Management, Enterprise Threat Management,Cryptography & Credential Safety etc.


APPLIES TO: Enterprise

F5 Branded products follow Secure Software Development practices that align with industry standards, such as NIST 800-53 and NIST 800-218. Our Secure Software Development lifecycle includes several key components, such as (but not limited to): threat modeling, design reviews, code reviews, vulnerability scanning, security testing, and periodic penetration testing of critical components.


APPLIES TO: Enterprise

Yes. All F5 personnel are subject to pre-employment screening and background check in accordance with relevant laws, regulations and contractual agreements. Screening includes criteria aligned to business requirements, sensitivity of job roles and responsibilities and the potential risks associated with derogatory background status that may indicate risk of theft, fraud or misuse of facilities. If the role was associated with higher risk or visibility, such as the Chief Financial Officer, additional checks were required to ensure the individual was suitable for the role (for example, credit checks). As for contractors, F5 relies on the staffing agencies (with whom F5 had contracts in place) to perform the background checks.


APPLIES TO: Enterprise

F5 has implemented Data Loss Prevention (DLP) solution and program. DLP performance is monitored continuously, and processes are in place to handling if data loss is suspected. The DLP setup has rules for the prohibition of unauthorized transfers of sensitive or personal information to external sites e.g., webmail, blogs, personal storage sites etc. The DLP rules are reviewed at regular cadence. All organization emails are also scanned by DLP.


APPLIES TO: Enterprise

Information Security policies are all reviewed on an annual basis. All of these policies have supporting standards, procedures, and operating practices which are additionally reviewed annually. Please note that there are many other additional policies supporting F5 business practices below are the ones most frequently requested.

  • Mobile Device Policy
  • Cyber Incident Response Plan
  • Enterprise Acceptable Use Policy
  • Enterprise Cloud Security Policy
  • Enterprise Cryptographic Controls Policy
  • Enterprise Geographic Location Policy
  • Enterprise Identity and Access Management Policy
  • Enterprise Information Security Policy
  • Enterprise Non-Routine Data Access Policy
  • Enterprise Patching and Vulnerability Management Policy
  • Enterprise Remove Work Security Policy
  • Enterprise Sanctions Policy
  • Enterprise Secure Software Development Policy
  • Enterprise Data Retention Policy
  • Enterprise Information Classification Policy
  • Enterprise Network Policy
  • F5 Disaster Recovery Program Policy


APPLIES TO: Enterprise

F5 has an Incident Management program supported by Incident Response Plan which is tested annually. For the shared responsibilities with regards to incident management needs, please refer to your contractual agreement in place with F5.


APPLIES TO: Enterprise

F5 maintains a Vulnerability and Patch Management program supported by policy and procedure documents. The cybersecurity team that routinely performs security assessments separate from the development group on new developments or upon a significant change to the product. Vulnerability assessments of the production network, supporting production infrastructure, and services are performed at least on a quarterly basis to identify potential security vulnerabilities. F5 employs various tools/services to regularly scan our networks (internally and externally), code base or repo, applications, and other dependencies to discover any vulnerabilities. These vulnerabilities are then triaged and remediated by the relevant owners as per the defined SLA. The SLA is defined in our policy and supporting documents and is driven by several factors including but not limited to industry guidelines/best practices, criticality/severity, our environmental factors etc. Other sources available in the industry and vendor releases are also utilized to identify the new vulnerabilities that may impact us, and appropriate actions are taken to triage and remediate.


APPLIES TO: Enterprise

F5 maintains several methods to prevent unauthorized connections (including remote access) to internal systems and resources. In order to remotely access the production environment and production systems, employees have to first authenticate via our Enterprise IAM solution which requires multifactor authentication utilizing a selected user password and a rotation soft token. Subsequently, users must connect utilizing our enterprise VPN solution which also requires multifactor authentication utilizing a user password and rotating soft token. Following authentication, users have set role-based access permissions and installed device certificates permitting various access to systems and resources. Split tunneling is not permitted.F5 access control through RBAC, principle of least privilege, need to know and user lifecycle management


APPLIES TO: Enterprise

A multi-tier network architecture is implemented with physical and logical separation of Production, DMZ and non-Production environment. Please note we cannot share the Corporate network diagrams or full network security policy externally since it is considered confidential in nature.


APPLIES TO: Enterprise

F5’s Business Continuity Plan is based on an enterprise-wide Business Impact Assessment (BIA). The BIA identifies critical business areas and processes that have the potential, if disrupted, to result in a major impact to overall business operations, reputation, and/or profitability within 48 hours after the inception of the disruption. The BIA and Business Continuity Plan take into consideration critical resources necessary for sustained operation and strategies to compensate for the loss or unavailability of: Facilities/Locations, Key Personnel, IT Applications, and 3rd Party Service Providers


APPLIES TO: Enterprise

Data refers to transaction streams, files, data stores, tables, and output used or processed by the Company. Customer data is managed, processed, and stored in accordance with relevant data protection and other regulations and with specific requirements formally established in the agreements executed between F5 and customers or vendors.

The Company has deployed secure methods and protocols for transmission of confidential or sensitive information over public networks. Encryption is enabled for data stores housing sensitive customer data.

All customer data stored or processed by F5 services is considered confidential. F5’s data classification and handling requirements are defined as follows:

  • Critical (Confidential)
  • Restricted
  • Internal
  • Public


APPLIES TO: Enterprise

Monitoring is critical to understanding the effectiveness of controls, whether they are operating as intended or if they should be redesigned to better fit processes or improve effectiveness. Management and supervisory personnel are responsible for monitoring the quality and effectiveness of internal control as part of their regular activities. Members of F5 product teams regularly participate in security and risk-based groups to monitor the impact of emerging technologies.


APPLIES TO: Enterprise

The Security Operations Center (SOC) provides specialized 24/7 support. The Security Operations Center proactively monitors enterprise services and actively manages the instances to respond to attacks as they happen.

The Security Operations Centers operates in a follow-the-sun model and is sufficiently staffed during regular working hours in each region. The Security Operations Center operates globally out of the following locations: Seattle (USA), Hyderabad (India), Warsaw (Poland), Guadalajara (Mexico).

The SOC locations information can be viewed at: https://docs.cloud.f5.com/docs-v2/platform/reference/data-residency-locations


APPLIES TO: F5 Distributed Cloud Managed Services

F5 has a robust cybersecurity program supported by the Enterprise Information Security Policy (EISP) and a comprehensive set of other cybersecurity policies and standards. One of the objectives of these policies is to ensure that the F5 has appropriate security controls in place to protect our customer data against unauthorized access, loss and corruption. The policy is an integral part of the F5 Information Security Management System (ISMS). Additionally, it aligns with the industry standards and frameworks and the applicable laws and regulations including the NIST 800-53 standard. F5 undergoes annual external audit wherein the design of the security controls, its implementation and operational effectiveness are evaluated.


APPLIES TO: Enterprise

F5 has an established a Vendor Management program. As a part of this process, third-party service providers are evaluated based on their risk to the Company and its data. The F5 Cybersecurity team conducts a risk assessment of all vendors that have access to F5’s data or its systems during onboarding and annually, thereafter. Third Party Security Assessment (TPSA) is also conducted as a due diligence exercise to evaluate the third party’s security posture, whether a vendor, partner, client, contractor, consultant, or intermediary. The goal is to ensure their security practices meet our organization’s minimum-security standards. All vendors are required to agree to appropriate protection of F5 ad customer data. Agreements with third-party vendors includes provisions to align with F5’s business and confidentiality requirements. Vendor security compliance reports and certifications are reviewed by the Compliance team to ensure vendor controls are aligned with F5 policies and standards during onboarding, and annually thereafter.


APPLIES TO: Enterprise

Please note established RTO and RPO are only applicable to our SaaS services (Distrubuted Cloud, AI Guardrails, AI Red Team, NGINX One, Bot Defense).

  • Recovery Time Objectives (RTO): Twenty-four hours
  • Recovery Point Objectives (RPO): Six hours


APPLIES TO: F5 Distributed Cloud Managed Services

F5 has an AI/ML Model Governance Team which reviews all uses of any model used within the enterprise or incorporated in the product. Model Impact Assessments are conducted for all models. F5 maintains an Enterprise Artificial Intelligence (AI) Policyaligns with ISO/IEC 42001:2023 Information Technology (Artificial Intelligence Management System) and is reviewed and updated at least annually.


APPLIES TO: Enterprise

Please review the applicable product specific Privacy Statement: https://www.f5.com/company/policies/privacy-notice


APPLIES TO: Enterprise

From ensuring compliance to service guides, we have several reference documents for employees, vendors, and partners. Find governing documents for our products, support services, privacy, and contracts Please see F5 policies and documentation at https://www.f5.com/company/policies.


APPLIES TO: Enterprise

Yes, The Chief Privacy Officer oversees the implementation of our privacy compliance program, reporting to the General Counsel. The Data Protection Officer is an outside attorney with expertise in data protection, retained by the company as an advocate for data subjects, who reports to the Board of Directors and works in consultation with the Chief Privacy Officer.


APPLIES TO: Enterprise

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us
F5 Compliance | F5