Broadcom z/OS

Cleanup Modernization Guide

AdministrationAutomationSecurity

Cleanup is a administration product by Broadcom. Explore technical details, modernization strategies, and migration paths below.

Product Overview

Cleanup is a z/OS utility designed to streamline security administration by automating the removal of obsolete, unused, or redundant security rules from RACF, CA ACF2, and CA Top Secret databases.

Cleanup complements existing security systems by providing automated cleanup capabilities.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What does Cleanup do?

Cleanup is a utility designed to identify and remove obsolete, unused, redundant, or excessive security rules from mainframe security databases such as RACF, CA ACF2, and CA Top Secret. It helps organizations maintain a clean and efficient security environment by continuously monitoring security rule usage.

Is this a system, application, or tool?

Cleanup is a toolset focused on administration and automation of security rule management. It provides functionalities for identifying and removing unnecessary security rules, thereby streamlining security administration processes.

What types of organizations use this?

Organizations that manage security using RACF, CA ACF2, or CA Top Secret on z/OS mainframes can benefit from Cleanup. This includes enterprises in industries such as banking, finance, insurance, and government, where stringent security policies and compliance requirements are essential.

When should we consider Cleanup?

A company should consider using Cleanup when its security databases become cluttered with obsolete or redundant rules, leading to inefficiencies and potential security vulnerabilities. Regular use of Cleanup can help maintain a streamlined and effective security posture.

What are the alternatives to Cleanup?

Alternatives to Cleanup include manual security rule reviews, custom scripting, or other security administration tools. Some competitors include zSecure Admin and Vanguard Enforcer. Cleanup distinguishes itself through its continuous monitoring and automated cleanup capabilities.

Technical

For mainframe products: Does this run in an LPAR?

Cleanup runs on the z/OS platform and is dependent on the presence of a security management system like RACF, CA ACF2, or CA Top Secret. It operates within an LPAR and requires access to the security databases managed by these systems.

How is this product typically deployed?

Cleanup is typically deployed on-premise, within the z/OS environment where the security databases reside. It requires technical expertise in z/OS, security administration, and the specific security system in use (RACF, CA ACF2, or CA Top Secret).

Is this a standalone product or does it extend/enhance another product?

Cleanup enhances existing security systems by providing automated cleanup and monitoring capabilities. It does not replace the core security functionality provided by RACF, CA ACF2, or CA Top Secret but rather complements them.

What other products or components must be present for this to work?

Cleanup requires access to the security databases managed by RACF, CA ACF2, or CA Top Secret. It also needs appropriate authorization to query and modify security rules within these systems.

Business Value

What business problem does it solve?

Using Cleanup helps organizations reduce the complexity of their security administration, improve compliance, and minimize potential security risks associated with obsolete or redundant rules. It streamlines security management and enhances overall security posture.

What would happen if an organization did NOT use this product?

If an organization does not use Cleanup, it may face challenges related to inefficient security administration, increased risk of security breaches due to outdated rules, and difficulties in maintaining compliance with security policies.

When is this product a good fit?

Cleanup is a good fit for organizations that need to maintain a clean and efficient security environment on their z/OS mainframes. It is particularly beneficial for those with large and complex security rule sets.

Security

How does this product integrate with enterprise ecosystems?

Cleanup integrates with existing security systems such as RACF, CA ACF2, and CA Top Secret. It leverages the security features of these systems to identify and manage security rules. It may also integrate with reporting and auditing tools to provide insights into security rule usage.

What specific authentication methods are supported?

Cleanup supports authentication methods provided by the underlying security systems (RACF, CA ACF2, CA Top Secret). It uses the access control models of these systems to ensure that only authorized personnel can manage security rules.

What access control model is used?

Cleanup uses the access control model inherent in the security system it is managing (RACF, CA ACF2, or CA Top Secret). This ensures that only authorized users can modify or delete security rules.

Operations

What ongoing operational requirements exist?

Ongoing operational requirements for Cleanup include monitoring its performance, ensuring its compatibility with the security systems, and maintaining its configuration. Regular reviews of its logs and reports are also essential.

What are common implementation challenges?

Common implementation challenges include ensuring proper authorization for Cleanup to access and modify security rules, configuring it to accurately identify obsolete rules, and integrating it with existing security workflows.

What administrative interfaces are available?

Administrative interfaces for Cleanup may include a command-line interface (CLI) or a web-based console, depending on the specific implementation. These interfaces allow administrators to configure, monitor, and manage the cleanup process.

What monitoring/logging capabilities exist?

Cleanup provides monitoring and logging capabilities to track its activities and identify potential issues. These logs can be used for auditing and troubleshooting purposes.

Ready to Start Your Migration?

Download our comprehensive migration guide for Cleanup or calculate your ROI.

Calculate ROI