Beacon is our easy-to-use risk assessment platform. This is where risk assessors, including Resource Owners and Custodians, complete risk assessment questionnaires. Use the SAML Authentication button for logon. Accessible only from the campus network or via the Remote Access VPN.
Risk Management
Risk Lifecycle
All risk has a lifecycle and must be checked regularly. The frequency of these reviews depends on the type of information resources and sensitivity of the data it handles. Ongoing risk assessments should be expected by Information Resource Owners and Custodians. This section provides a breakdown of process and gives a visual references.
Unauthorized Services
Unauthorized third-party, cloud hosted services are not permitted on the Texas State network. The university must maintain clear contractual agreements with vendors to protect state agency data and unauthorized vendors provide no such protections. This section explains the prohibitions, policies, and best practices regarding third-party, cloud hosted services. Read more about what this means and how it applies.