Great news! 

We have finally been posted to the Defense Information Systems Agency (DISA) Unified Capability (UC) Approved Product List (APL), as an IA Tool.  The certification covers all F5 BIG-IP platforms (VE through Viprion) running a minimum of TMOS 11.6.  The certification Memo can be found at the following link:  DISA UC APL F5 Approval Memo

Anyone that has been through the now defunct DoD Information Assurance Certification and Accreditation Process (DIACAP) or DoD Information Technology Security Certification and Accreditation Process (DITSCAP) in the past (1) knows it’s a party, and (2) may know that F5 BIG-IP used to be classified as a “Content Switch / Load Balancer with an OS of Other Network OS.”  With the new APL certification, F5 is now classified as an IA tool.   While the Certification and Accreditation process will look pretty much the same, things concerning the F5 are starting to change quite a bit. 

Change 1.  F5 Military Unique Deployment Guide.  This document helps identify and configure the BIG-IP base configuration required to pass IA scans.

Change 2.  There is much better clarification on which STIGS apply to F5 BIG-IP, and stronger guidance on how to configure your platform in adherence to STIG and Security Requirements Guidelines (SRG).   

Change 3.  There is also the new National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) process (DoD Instruction 8501.01).  We didn’t have anything to do with this, but its new, and its important to know that we are in line with this process.

 

Getting Started

To start preparing the F5 BIG-IPs on your network, you should reach out to your account team to acquire a copy of the Military Unique Deployment Guide (MUDG), which details the proper base configuration.  The MUDG can be acquired from any member of the F5 Federal team.  However, due to sensitive information, a copy of the Information Assurance Assessment Package (IAAP) must be acquired directly from the Unified Capability Certification Office (UCCO), details on this information is located within the DISA UC APL Certification Memo.

Next, Apply STIG/SRG.  These are currently in process, but the MUDG is sufficient to lock the appliance down to pass initial IA scans.

 

Draft STIG Release Guidance -Update: Final F5 STIG / SRG released, see below.

There have been a lot of questions lately on the release of the Draft STIGS for BIG-IP.  The important things to note are as follows:

  • First and foremost, do not apply draft STIGS.
  • These are drafts and not yet final. 
  • Do not start applying draft STIGS in production environments.
  • Draft STIGS are subject to change.
  • Finally, do not apply draft STIGS.

To access and review the Draft STIGS, you can find them at the following location: http://iase.disa.mil/stigs/net_perimeter/network-infrastructure/Pages/network-overview.aspx

Final STIG/SRG Release Guidance

There have been a lot of questions lately on the release of the Final STIGS / SRGS for BIG-IP.  The important things to note are as follows:

  • It is important to first follow and apply the guidance provided in the Military Unique Deployment Guide v1.2 (MUDGv1.2).
  • If you have any questions or concerns regarding the guidance or text in the F5 Final STIGS, do not hesitate to reach out to your account team.

To access the Final F5 STIGS, you can find them at the following location:  http://iase.disa.mil/stigs/net_perimeter/network-infrastructure/Pages/other.aspx

Need Help?  Contact Federal [at] F5.com.