# CyTech AQUILA - Information Security Pressure Analysis (ISPA)

#### **Overview:** 

**Information Security Pressure Analysis (ISPA)** is a section that shows an overview of the assessments such as **Security Risk Assessment, Security Pressure Analysis,** and **Security Risk Appetite.** That helps the client current risk levels and their overall status of their organization based on the taken assessment.

#### **Key Features:**

- **Security Maturity Overview**
- **Risk Exposure Overview**

<p class="callout success">**To navigate to Information Security Pressure Analysis (ISPA), please follow the instructions below:**</p>

**Step 1: Log in to CyTech - AQUILA: [usdc.cytechint.io](https://usdc.cytechint.io/)**

**Step 2: Click on Regulatory Intelligence**

[![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/FDtJs6TBhoe1mz6c-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/FDtJs6TBhoe1mz6c-image.png)

**Step 3: Choose Information Security Pressure Analysis (ISPA)**

[![HEHE (5).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/pVzcvX21qYjVSBVD-hehe-5.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/pVzcvX21qYjVSBVD-hehe-5.png)

**Step 4: Hover into leftmost panel to view all the Regulatory Intelligence &amp; Compliance sections. This Process is applicable in all navigating into a Module.**

[![Hello (3).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/cleUy8oysQXAZW4T-hello-3.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/cleUy8oysQXAZW4T-hello-3.png)

#### **Dashboard**

This section shows an overview of the current score and status of the organization, such as their **Security Pressure**, **Risk Exposure**, **Risk Appetite**, **Assessment Coverage**, **Security Target State Trends**, and **Recommended Security Maturity**.

[![HEHE (6).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/OccHpXxpnZrIdfI8-hehe-6.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/OccHpXxpnZrIdfI8-hehe-6.png)

1. **Recommended Security Maturity** - This section shows the security maturity score. This will be available and calculated after completing the assessment.  
      
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/UVdan2h01HW53l4S-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/UVdan2h01HW53l4S-image.png)
2. **Security Target State Trends** - This view highlights how your Information Security Target State has evolved over time. Rising levels suggest growing governance and oversight requirements, while stable levels indicate consistent risk conditions.  
      
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/r1gfTeB7Rme1KlZ1-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/r1gfTeB7Rme1KlZ1-image.png)
    
      
    Clients can also click the graph to view the historical progression of your recommended security maturity. Recommended security maturity will be calculated after completing the Information **Security Pressure Analysis**.
3. **Assessment Coverage** - This section shows an overview of assessment such as their last taken assessment, their next assessment and completed assessment of the client.  
      
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/1MCDxJXp4f3RkE4i-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/1MCDxJXp4f3RkE4i-image.png)
    
      
    To take the assessment clients can press the "**Start Assessment**" button and it will redirect them into a new page named "**Security Risk Assessment"** where it shows and let them provide structured responses to evaluate organization's risk exposure, external pressures, and security risk tolerance.   
      
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/aIJe5BW0yT4I7MuH-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/aIJe5BW0yT4I7MuH-image.png)
4. **Security Pressure** - This section provides an overview of the "**Security Pressure Score".** The score will be calculated after completing the assessment.  
      
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/bTkJnVE1bTm7eYZh-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/bTkJnVE1bTm7eYZh-image.png)  
    Clients can also press the "[![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/zgiL0lUIckgAk4IS-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/zgiL0lUIckgAk4IS-image.png)" to see the full overview of the "**Current Score**". This section also reflects the level of strain on security controls based on current threats and operational factors and is mapped to a status level to indicate overall pressure intensity.
    
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/UlmCjXZiSKBvPexU-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/UlmCjXZiSKBvPexU-image.png)
5. **Risk Exposure -** Inherent Security Risk Exposure estimates how exposed the organization is to cyber threats before additional mitigation is applied. The percentage is derived from your assessment answers across threats, assets, and incident indicators, then mapped to a status level.  
      
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/32nJMBL9uQ77N3QT-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/32nJMBL9uQ77N3QT-image.png)
    
      
    Clients can also click the [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/rbRR4PL7hSo23rVr-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/rbRR4PL7hSo23rVr-image.png) icon to see the full overview of the "**Risk Exposure Score"** [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/ywjlpoO2HxLJfytn-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/ywjlpoO2HxLJfytn-image.png)
6. **Risk Appetite** - Risk Appetite indicates how much risk the organization is willing to accept, mapped to a status level to reflect overall risk tolerance.  
      
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/PmOOhfiJPrVMhGZF-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/PmOOhfiJPrVMhGZF-image.png)  
      
    Clients can also click the [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/rbRR4PL7hSo23rVr-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/rbRR4PL7hSo23rVr-image.png) icon to see the full overview of the "**Risk Appetite".** Results will be available once the assessment is taken.
    
    #### [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/zuwuqY2F1tx8PnOr-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/zuwuqY2F1tx8PnOr-image.png)

#### **Assessments**

View organization's current security risk level, outside pressures, and overall risk status based on your assessment.

##### **Security Risk Assessment**

Review organization's current risk level and the key factors contributing to it.

[![HEHE (7).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/wiK05hSb5u08VVon-hehe-7.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/wiK05hSb5u08VVon-hehe-7.png)

1. **Current Inherent Security Risk Exposure** - Overall inherent risk exposure based on threats, assets, vulnerabilities, and incident history from your answers.  
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/c6f6VHS03X2XcCzm-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/c6f6VHS03X2XcCzm-image.png)
2. **Contributing Risk Factors** - Category scores that contribute to the overall risk exposure. Higher categories indicate stronger exposure drivers. Will be available once the assessment was taken.  
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/Vh6i07iAT6xjIY7Q-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/Vh6i07iAT6xjIY7Q-image.png)
    
      
    **Vulnerabilities** - Category scores that contribute to the overall risk exposure. Higher categories indicate stronger exposure drivers.  
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/plpSqz4mv52h3oWs-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/plpSqz4mv52h3oWs-image.png)
3. **Risk Assessment Summary** - Summary of your overall exposure and the top drivers based on this assessment.  
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/hYURjY3AyifhfPSK-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/hYURjY3AyifhfPSK-image.png)
    
    **Assessment Purpose** - Explains what this assessment measures and why it matters to leadership decisions.  
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/9Z9Ov8l1IPZKNu7X-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/9Z9Ov8l1IPZKNu7X-image.png)

##### **Security Pressure Analysis**

Review your organization's current security pressure and the key factors contributing to it.

[![HEHE (8).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/NdqYPpfJrXPyrWTl-hehe-8.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/NdqYPpfJrXPyrWTl-hehe-8.png)

1. **Current Security Pressure** - Overall pressure on the security program based on stakeholder expectations captured in this assessment.  
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/WH0vafiEDt24kxKv-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/WH0vafiEDt24kxKv-image.png)
2. **External Stakeholders** - Pressure driven by external obligations such as regulators, auditors, and customers.  
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/A1uQDHcPldTOHoBP-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/A1uQDHcPldTOHoBP-image.png)
    
      
    **Internal Stakeholders** - Pressure driven by internal delivery, operations, and technology expectations.  
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/4KmMhduSkJARtTsO-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/4KmMhduSkJARtTsO-image.png)
3. **Pressure Analysis Summary** - Summary of your overall pressure and the strongest drivers based on this assessment.  
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/4URDG3NDezPI05pu-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/4URDG3NDezPI05pu-image.png)
    
      
    **Assessment Purpose** - Explains what this assessment measures and why it matters to leadership decisions  
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/u3LhncuFDKMc40ux-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/u3LhncuFDKMc40ux-image.png)

##### **Security Risk Appetite**

Review your organization's current risk appetite and the key factors contributing to it.

[![HEHE (9).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/h690GxAg9vwp4fEA-hehe-9.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/h690GxAg9vwp4fEA-hehe-9.png)

1. **Current Security Risk Appetite** - Overall tolerance for risk based on the tolerances you selected across impact areas.  
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/WZYAjRZ64hX9zud3-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/WZYAjRZ64hX9zud3-image.png)
2. **Risk Appetite Baseline** - Compares your selected tolerances against the baseline for each impact area to show how your appetite differs.  
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/f6gvbaRsKDVqZe8l-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/f6gvbaRsKDVqZe8l-image.png)
3. **Risk Appetite Summary** - Interprets what your appetite level means for how risk decisions are typically handled.  
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/TvPgwR2XsjptcD2U-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/TvPgwR2XsjptcD2U-image.png)
    
      
    **Assessment Purpose** - Explains what this assessment measures and why it matters to leadership decisions.  
    [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/EbI99hSP06bm46U8-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/EbI99hSP06bm46U8-image.png)

**Assessment History** - By pressing this button it will open up a sidebar that shows the histories of assessments.

[![HEHE (10).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/RXNGkAzplEi7lNIj-hehe-10.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/RXNGkAzplEi7lNIj-hehe-10.png)

Clients can also access the "Assessment Settings" button. By pressing it, shows **Reassessment Cycle** and **Weighting.**

- **Reassessment Cycle -** Update how often assessment is reassessed.
- **Weighting -** Adjust how much each area contributes to the overall score. Each section must total 100%

[![HEHE (11).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/xg3CnVKz8k8GecqD-hehe-11.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/xg3CnVKz8k8GecqD-hehe-11.png)

#### **Conclusion**

**Information Security Pressure Analysis (ISPA)** purpose is to manage and handle multiple results on each assessment that the organization was added, such as **Security Risk Assessment**, **Security Pressure Analysis**, **Security Risk Appetite** managing current risk level and key factors that are contributing to the scoring on each metrics.