Technical Articles
F5 SMEs share good practice.
cancel
Showing results for 
Search instead for 
Did you mean: 
Chad_Davis
F5 Employee
F5 Employee

Logs can either tell you everything you need to know for a quick resolution, or they lack the required detail, like what passed and what failed — leaving many scratching their heads when attempting any sort of meaningful forensic data analysis. This is especially frustrating for those in the DoD, who face the most serious of threats from nation state attacks and other malicious actors, as well as high performance expectations from those relying on their applications. Drawn out resolutions are not acceptable.

To pile on, the 2021 May Executive Order on Improving the Nation’s Cybersecurity is raising the bar for those in the DoD. A failure in any one of the abilities to detect, report, employ protections in a timely manner, and ultimately defend against the threat can cause a cascading effect on whether or not a threat is successfully thwarted. Detailed logging and monitoring capabilities can be a key factor in this fight.

Industry guidance, like the DoD Digital Modernization Strategy, can help to provide a roadmap to support the implementation of the National Defense Strategy lines of effort through the lens of cloud, artificial intelligence, command, control, and communications, and cybersecurity. However, to have the best defense strategy in place, having the right solutions, like ones with extremely detailed logging capabilities is crucial.

The BIG-IP system includes advanced logging and monitoring functionality and provides security features to protect against attacks that can result from insufficient system and application logging and monitoring.

For more information about securing your F5 products against security logging and monitoring failures, refer to this article.

Version history
Last update:
‎08-May-2022 18:00
Updated by:
Contributors