Mainframe Cybersecurity & Compliance

 View Only

Did You Know? Security Installation Checklists

  • 1.  Did You Know? Security Installation Checklists

    Broadcom Employee
    Posted Jan 09, 2026 10:30 AM
    Edited by Jaysa Tammaro Jan 09, 2026 10:30 AM

    The following security products include an Installation Checklist to give you a blueprint for the installation from start to finish. 

    • ACF2 for z/OS
    • ACF2 Option for Db2
    • Advanced Authentication Mainframe (AAM)
    • Auditor
    • Cleanup
    • Compliance Event Manager (CEM)
    • Compliance Information Analysis (CIA)
    • Mainframe Security Insights Platform (SI)
    • LDAP
    • Top Secret for z/OS
    • Top Secret Option for Db2
    • Trusted Access Manager for Z (TAMz)

    This checklist:

    • Summarizes the required steps for a base installation (first-time installation) in the required order. 

    • Includes a brief description of the steps, with links to the comprehensive information required for the installation.

    • Identifies the roles that are typically required to complete each step, which enables the installation planning team (systems programmer, security administrator, and so on) to focus on the tasks for which they are responsible.

    We offer this checklist in HTML format and in a downloadable xls so you and your team can use it locally to manage your installation process. 

    To use the checklist, see Installing on the product's techdocs site.

    All Broadcom Mainframe products provide this job aid to help you install, configure, and deploy our software.


    #ACF2
    #AdvancedAuthenticationMainframe
    #Auditor
    #Cleanup
    #ComplianceEventManager
    #LDAP
    #MainframeSecurityInsights
    #TopSecret
    #TrustedAccessManagerforZ
    #General-MainframeCybersecurityandCompliance

    ------------------------------
    Principal Technical Writer
    Mainframe Software Division
    Broadcom
    ------------------------------