Broadcom z/OS z/VM

ACF2 Modernization Guide

Security

ACF2 is a security product by Broadcom. Explore technical details, modernization strategies, and migration paths below.

Product Overview

Imagine your mainframe as a high-security bank vault.

First, you define your users and groups, like creating employee profiles.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What is ACF2?

ACF2 is a mainframe security product that provides access control, data protection, and compliance reporting. It helps organizations secure their critical data and applications on z/OS and z/VM platforms.

How does ACF2 work?

ACF2 uses a rule-based system to define access permissions. Administrators create rules that specify which users or groups can access specific resources, such as datasets, transactions, or programs. These rules are evaluated at runtime to determine whether access should be granted or denied.

What authentication methods does ACF2 support?

ACF2 supports various authentication methods, including passwords, multi-factor authentication (MFA), and digital certificates. It integrates with other security products and technologies to provide a comprehensive security solution.

Does ACF2 provide logging and auditing capabilities?

ACF2 provides extensive logging and auditing capabilities. It records all access attempts, security violations, and administrative changes. This information can be used for security monitoring, incident response, and compliance reporting.

Technical

How is ACF2 administered?

ACF2 uses Resource Access Control Facility (RACF) commands for administration. These commands allow administrators to define users, groups, resources, and access rules. ACF2 also provides a set of utilities for managing and maintaining the security database.

Does ACF2 offer APIs for integration?

ACF2 supports various integration options, including APIs and exits. These interfaces allow developers to customize ACF2's behavior and integrate it with other applications and systems.

Can ACF2 be configured for different environments?

ACF2 can be configured to enforce different security policies based on the environment. For example, different rules can be applied to production and test systems.

Does ACF2 support role-based access control?

ACF2 supports role-based access control (RBAC). Administrators can define roles and assign users to those roles. Access permissions are then granted to roles, rather than individual users, simplifying administration and improving security.

Business/ROI

How does ACF2 reduce business risk?

ACF2 helps organizations reduce the risk of data breaches and security incidents. By providing strong access control and data protection, ACF2 can prevent unauthorized access to sensitive information.

How does ACF2 help with regulatory compliance?

ACF2 helps organizations comply with industry regulations and security standards. It provides the necessary controls and reporting capabilities to meet compliance requirements.

Does ACF2 improve operational efficiency?

By automating access control and security management, ACF2 can reduce administrative overhead and improve operational efficiency. This can lead to cost savings and improved productivity.

How does ACF2 improve business outcomes?

Implementing ACF2 can improve an organization's security posture and enhance its reputation. This can lead to increased customer trust and improved business outcomes.

Security/Compliance

What security controls does ACF2 offer?

ACF2 provides a comprehensive set of security controls to protect sensitive data and applications. These controls include access control, data encryption, and intrusion detection.

Does ACF2 support security standards and certifications?

ACF2 supports various security standards and certifications, such as PCI DSS and ISO 27001. It helps organizations meet the security requirements of these standards.

Does ACF2 provide audit trails?

ACF2 provides detailed audit trails that can be used to track security events and identify potential security breaches. These audit trails can be used for forensic analysis and compliance reporting.

Can ACF2 be integrated with other security products?

ACF2 can be integrated with other security products and technologies to provide a layered security approach. This helps organizations protect their systems from a wide range of threats.

Operations/Support

What kind of support is available for ACF2?

Broadcom provides comprehensive support for ACF2, including online documentation, training, and technical assistance. Customers can access these resources through the Broadcom support portal.

What kind of maintenance does ACF2 require?

ACF2 requires ongoing maintenance and monitoring to ensure its effectiveness. This includes applying security patches, reviewing audit logs, and updating access rules.

Are there training courses for ACF2?

Broadcom offers various training courses and certifications for ACF2 administrators and users. These courses cover topics such as installation, configuration, and troubleshooting.

Does ACF2 provide tools for monitoring system performance?

ACF2 provides various tools and utilities for monitoring system performance and identifying potential security issues. These tools can help administrators proactively address problems before they impact the business.

Planning/Roadmap

How often is ACF2 updated?

Broadcom regularly releases new versions of ACF2 with enhanced features and security updates. Customers should plan to upgrade to the latest version to take advantage of these improvements.

Is there a roadmap for future ACF2 development?

Broadcom provides a roadmap for future ACF2 development, outlining planned features and enhancements. Customers can use this roadmap to plan their security strategy and budget.

How should ACF2 be integrated into an organization's security strategy?

Organizations should integrate ACF2 into their overall security architecture and strategy. This includes defining security policies, implementing access controls, and monitoring security events.

How often should ACF2 configuration be reviewed?

Organizations should regularly review and update their ACF2 configuration to ensure it aligns with their business needs and security requirements. This includes updating access rules, monitoring security logs, and applying security patches.

Ready to Start Your Migration?

Download our comprehensive migration guide for ACF2 or calculate your ROI.

Calculate ROI