Scott Walker,
I see your concern about disabling the non-SSL port (quoting the key content: "...removing [the non-SSL port] will solve the auditor's question but what about that one random app that lingers who is still remediating or may not even know to do so. Removing that port and finding out the hard way requires a second outage to add it back. ")
At my site, there is a firewall server, which has the ability to block any port which exists in the enterprise network. I'm not read in at that level, so I don't know whether such a server is rare, common, or universal in the wild. However: for us, the solution to the stated problem would be to change, not the mainframe/DB2 non-SSL port, but instead the firewall entry permitting traffic to reach it. That change is dynamic and immediate, and so could be withdrawn within minutes of receiving a customer complaint.
If Leo's customers (like the customers for most of us in this niche!) aren't able to fully identify uses of the old port, I recommend considering this method: ask your friendly local network manager (management team) whether they can do this, and plan the change that way. Then you-all can remove the old port in a future outage, for example an RSU change or z/OS maintenance.
HTH (Hope This Helps)
/phil