APM-Specific Features for Securing Your Website
Introduction
The BIG-IP Access Policy Manager (APM) module offers a robust suite of tools to implement a zero-trust security model quickly and effortlessly with Access Guided Configuration (ACG). For those aiming for finer control, security measures can also be configured step-by-step to meet specific needs. In this article, we’ll share key ideas and recommendations on how and why you might deploy these features.
While working on this post, I came across an exceptional F5 Knowledge article [K000138221], authored by one of our brilliant engineers. It perfectly encapsulates the ideas I had in mind, offering a highly structured and informative perspective. My goal here is to present those insights in a simplified, Explain It to Me Like I’m Five format, making it more accessible to readers. By the end of this article, you'll have a clear understanding of what BIG-IP APM is and the key security features it provides.
About APM
BIG-IP APM is a powerful solution designed to enable Zero-Trust (ZT) security architectures. It delivers a wide range of essential zero-trust features, including:
- Enforcing authentication and authorization processes
- Multi-factor authentication (MFA)
- Continuous access verification
- Scope verification
APM’s zero-trust model can be deployed seamlessly using Access Guided Configuration (ACG), or configured manually for advanced customization. While primarily an Identity and Access Management (IAM) tool, APM includes many additional features that elevate it to something much greater. Beyond basic IAM capabilities such as authentication (SSO, OIDC, LDAP, certificates, CAPTCHA, and more) and authorization (OAuth, SAML, JWT, RADIUS, Kerberos), it also offers:
- Endpoint posture checks
- Advanced session management
- VPN and application tunneling
- Webtop (a browser-based desktop environment)
Although APM is not yet a full Zero-Trust Network Access (ZTNA) solution, the current version (17.5.x) shares many features with ZTNA platforms. In future releases—such as BIG-IP Next (version 20.x with the new F5OS operating system)—you can expect it to evolve into a leading ZTNA provider, incorporating additional features like user behavior analytics, continuous monitoring, threat analysis, and CI/CD pipeline compatibility.
How to Use APM to Secure Your Website
Below are tips and best practices for leveraging APM to strengthen your security posture:
1. Enable Debug Logs for Better Troubleshooting
A solid first step in enhancing your system’s security is enabling debug logs. While APM is not inherently a security-specific product, its logging capabilities are invaluable for troubleshooting authentication and authorization issues. Good logging practices capture detailed system behavior while protecting sensitive user data.
Turning on debug logging for specific APM features allows you to detect anomalies and address unexpected issues quickly. This is especially helpful in diagnosing problems such as session hijacking attempts.
Example debug log indicators:
- Denied logon errors with codes (e.g., Code 4001 for Zero resources assigned)
- Session deletion messages due to inactivity
For details on debugging, refer to: [K45423041].
2. Manage and Restrict User Sessions
APM treats each client connection as a session, allowing you to enforce restrictions like:
- Access scope limitations
- Inactivity timeouts
- Delayed retries after failed authentication
- Limits on simultaneous sessions per user or IP
Session configuration greatly mitigates risks such as session hijacking. For a deeper dive, check out: [K95925417] and [K18390492].
Indicators of compromise:
- High rates of failed logins in short durations
- Multiple accounts accessed from a single IP address (excluding NAT/CGNAT scenarios)
3. Implement IP Geolocation Restrictions
Your security policy may require blocking access from specific geographical regions. APM enables location-based restrictions and maintains an up-to-date trusted IP database. For improved accuracy, refer to: [K11176] and [K12866].
Indicators of compromise:
- Unusual geolocations for user sessions
- Automated logins from known proxy IPs
4. Enforce Endpoint Compliance
APM integrates with OPSWAT Endpoint Security Compliance (EPSEC) to perform endpoint posture checks. This can evaluate client configurations like registry keys, software versions, certificates, or antivirus status to ensure they comply with your organization’s standards.
Blocking older or vulnerable client systems helps reduce attack surfaces. Popular checks include verifying antivirus updates: [K38584342].
Indicators of compromise:
- Repeated failed posture checks for specific users or groups
5. Use CAPTCHAs to Thwart Automated Threats
CAPTCHAs mitigate automated attacks such as credential stuffing or account enumeration, which are increasingly common exploits. APM supports CAPTCHA validation, adding an extra layer of defense.
Indicators of compromise:
- High failure rates for CAPTCHA checks from specific IPs
- Repeated attempts from bots using outdated or invalid credentials
6. Enable Multi-Factor Authentication (MFA)
MFA is a critical layer of defense against brute-force and credential-stuffing attacks. By requiring something the user *has* (e.g., a mobile phone or hardware token) in addition to something they *know* (e.g., a password), you significantly reduce the risk of account compromise. See [K42422282] for details.
Indicators of compromise:
- High OTP (one-time password) failure rates
- Logins bypassing OTP due to misconfigurations
7. Use iRules for Advanced Request Filtering
BIG-IP supports iRules, which allow you to dynamically inspect, modify, and control HTTP requests. For example, you can filter requests based on headers, methods, or contents, blocking malicious agents from probing your system.
We recommend coordinating closely with your developers to refine which methods and headers are permissible. For guidance, check out: [K000137617].
Example iRule for blocking unnecessary headers:
when HTTP_REQUEST {
if {[HTTP::header exists "clientless-mode"]} {
HTTP::header remove "clientless-mode"
}
}
…
Indicators of compromise:
- Malicious user-agent strings (e.g., curl, Python requests)
- Excessive OTP requests or misconfigurations
8. Leverage VPN and ACL for Network Segmentation
APM can limit which users or clients have access to sensitive network resources. By implementing ACLs and mandatory VPNs, you create a barrier that reduces exposure to server-side request forgery (SSRF) attacks and unauthorized access.
Indicators of compromise:
- Requests with missing or custom headers
- Internal service hits from unauthorized sources
Endnotes
While these capabilities are extensive, implementing them manually via APM may seem daunting. Depending on your requirements, you might find additional modules—such as BIG-IP ASM—to be more plug-and-play for certain security needs.
For any implementation challenges, feel free to consult with F5 Support or engage F5 Professional Services.
1 Comment
- Injeyan_Kostas
Cumulonimbus
Indeed, APM is an incredibly powerful module.
It's a bit disappointing that similar capabilities aren’t yet available in F5 Distributed Cloud. Even having a subset of APM features would be a great starting point.
I truly hope F5 has something in the works, this would be a game changer for XC.