Our Process

  • Home
  • Our Onboarding Process
F5 ASM
OWASP
IPI

Onboarding the ASM Policies with our Subscription Services

At wafy.io, we aim to make your onboarding as smooth and transparent as possible. Here's how we handle access and communication during policy setup and ongoing reviews.

1. Access Requirements

Depending on your subscription level, our team may need different types or intervals of access to your F5 system.

  • We’ll request temporary or continuous access based on the services you’ve subscribed to.
  • You can grant, schedule, or restrict access as needed > We’ll work within your preferred boundaries.
  • If you prefer, we can keep the account in place and only activate it during scheduled windows.

2. Scheduling and Notifications

We’ll keep you informed every step of the way:

  • You’ll receive an outline of the intended work and access windows in advance.
  • If changes are required, we’ll always check with you first.
  • We work within a change process as required by your organisation.

3. Post-Session Updates

After each access or review session:

  • You’ll receive a brief update document summarizing what was done.
  • Any issues, improvements, or recommendations will be clearly listed.

This structured approach ensures your environment stays secure and you're always in control of what's happening.