# CyTech AQUILA - Security Maturity Assessment (SMA)

##### **Overview:**

The **purpose of Security Maturity Assessment (SMA)** is to make sure that an **organization** follows established **laws**, **regulations**, and **industry standards** designed to **protect sensitive data and systems**.

##### **Key Features:** 

- Cybersecurity maturity assessment framework
- Real-time dashboard with visual insights
- Peer benchmarking comparison
- Domain-level risk and control analysis
- Centralized assessment library
- Export and audit-ready reporting

<p class="callout info">**Let’s proceed to navigate the Cyber Security Compliance Module kindly follow the instructions below:**</p>

**Step 1:** Log in to **CyTech** – **AQUILA. [https://usdc.cytechint.io/](https://usdc.cytechint.io/ "AQUILA Website")**

**Step 2:** Click on Regulatory Intelligence

[![HEHE-2 (1).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/nkT4zd9GWsW5ie3J-hehe-2-1.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/nkT4zd9GWsW5ie3J-hehe-2-1.png)

**Step 3: Security Maturity Assessment (SMA)**

[![HEHE (4).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/OYurPGiZOBYXiajq-hehe-4.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/OYurPGiZOBYXiajq-hehe-4.png)

**Step 4: Client can also access it through the sidebar**

[![Hello (2).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/scaled-1680-/shj5cmihyqucrLMs-hello-2.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-04/shj5cmihyqucrLMs-hello-2.png)

### **Dashboard - Cyber Security Compliance (Module)**

The Cybersecurity Maturity Dashboard provides a consolidated view of an organization’s security posture across governance, technical controls, and cultural domains. It enables users to monitor performance, benchmark against peers, and identify areas for improvement.

The dashboard is divided into five key sections, each representing a different analytical perspective.

<span role="text">**1. Overall Maturity Score**</span>

<span role="text">**Purpose**</span>

Displays the organization’s **aggregate cybersecurity maturity level**.

<span role="text">**Components**</span>

- **Maturity Percentage:** Represents the overall score (e.g., 68%)
- **Maturity Rating:** Qualitative label (e.g., *Good Maturity*)
- **Peer Comparison:**
    
    
    - Peer Score (e.g., 54%)
    - Score Difference (e.g., +14%)

<span role="text">**How to Use**</span>

- Quickly assess overall security posture
- Compare performance against industry or peer benchmarks
- Track improvement over time

---

<span role="text">**2. Score by Governance &amp; Management Area**</span>

<span role="text">**Purpose**</span>

Provides a **domain-level breakdown** of cybersecurity maturity across key governance and management areas.

<span role="text">**Domains Included**</span>

- Risk Analysis
- Compliance Management
- Auditing
- Vulnerability Management
- Event &amp; Incident Management
- Policy &amp; Process Governance
- Security Culture

<span role="text">**How to Use**</span>

- Identify strong vs weak domains
- Prioritize improvement initiatives
- Support audit readiness and compliance tracking

---

<span role="text">**3. Policy &amp; Process Scores by Security Area**</span>

<span role="text">**Purpose**</span>

Displays **detailed maturity scores across technical and operational security domains**.

<span role="text">**Security Areas**</span>

- Network Security
- Applications
- Physical Security
- Host Security (Servers)
- Data Security
- End User Devices
- Identity &amp; Access Management (IAM)
- Security Culture – End Users
- Security Culture – IT

<span role="text">**How to Use**</span>

- Evaluate effectiveness of implemented controls
- Identify gaps in technical vs human security layers
- Support risk assessments and remediation planning

---

<span role="text">**4. Days Left to Next Assessment**</span>

<span role="text">**Purpose**</span>

Indicates the **remaining time until the next scheduled assessment**.

<span role="text">**Components**</span>

- Number of days remaining (e.g., 338 Days)
- Next assessment date

<span role="text">**How to Use**</span>

- Plan remediation and improvement activities
- Track audit cycles and compliance timelines
- Ensure readiness before reassessment

---

<span role="text">**5. Comparison: Your Score vs Peer Score**</span>

<span role="text">**Purpose**</span>

Visual comparison of **organization performance against peer benchmarks** across all domains.

<span role="text">**Visualization**</span>

- Radar (spider) chart
- Two datasets:
    
    
    - Your Score
    - Peer Score

<span role="text">**How to Use**</span>

- Identify competitive advantages
- Detect underperforming areas relative to peers
- Support strategic security planning

[![HEHE (16).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-03/scaled-1680-/j9RtHyDt70uENVQX-hehe-16.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-03/j9RtHyDt70uENVQX-hehe-16.png)

### **Assessment - Cyber Security Compliance (Module)**

The Assessment Dashboard enables organizations to evaluate their cybersecurity maturity across multiple domains. It provides visibility into assessment progress, performance against peers, and detailed scoring across core security areas.

The dashboard is organized into four main sections.

<span role="text">**1. Organization Details**</span>

<span role="text">**Purpose**</span>

Displays key contextual information about the organization being assessed.

<span role="text">**Components**</span>

- **Organization Name:** (e.g., CyTech Development &amp; Operations)
- **Sector &amp; Industry Classification**
- **Sub-sector Information**
- **Assessment Details:**
    
    
    - Reassessment date
    - Assessment frequency (e.g., every 12 months)

<span role="text">**How to Use**</span>

- Validate assessment scope and organizational context
- Ensure correct industry benchmarking alignment
- Confirm assessment timelines and scheduling

---

<span role="text">**2. Assessment Progress**</span>

<span role="text">**Purpose**</span>

Tracks completion status of the cybersecurity assessment.

<span role="text">**Components**</span>

- **Progress Indicator:** Percentage completion (e.g., 100%)
- **Status Message:** (e.g., *All Done!*)
- **Next Reassessment Date**

<span role="text">**How to Use**</span>

- Monitor completion of assessment questionnaires
- Ensure all required inputs have been submitted
- Identify readiness for generating results and reports

---

<span role="text">**3. Overview Results**</span>

<span role="text">**Purpose**</span>

Provides a **summary of overall assessment outcomes**.

<span role="text">**Components**</span>

- **Your Score:** Overall maturity score (e.g., 68%)
- **Peer Score:** Industry benchmark (e.g., 54%)
- **Score Difference:** Performance gap vs peers (e.g., +14%)
- **Maturity Rating:** Qualitative status (e.g., *Good Maturity*)

<span role="text">**How to Use**</span>

- Quickly evaluate overall cybersecurity posture
- Understand relative performance against peers
- Communicate high-level results to stakeholders

---

<span role="text">**4. Core Areas**</span>

<span role="text">**Purpose**</span>

Breaks down cybersecurity maturity into **individual assessment domains**, allowing detailed evaluation.

<span role="text">**Domains Included**</span>

<span role="text">**Risk Analysis**</span>

- Evaluates how effectively risks are identified and assessed
- Example Score: 64% vs 54% (peer)

<span role="text">**Compliance Management**</span>

- Measures alignment with regulatory and policy requirements
- Example Score: 83% vs 63%

<span role="text">**Auditing**</span>

- Assesses effectiveness of audit processes and controls validation
- Example Score: 100% vs 52%

<span role="text">**Vulnerability Management**</span>

- Evaluates identification and remediation of vulnerabilities
- Example Score: 35% vs 54%

<span role="text">**Event &amp; Incident Management**</span>

- Measure's ability to detect, respond, and recover from incidents
- Example Score: 84% vs 57%

<span role="text">**Policy &amp; Process Governance**</span>

- Assesses management and enforcement of policies and procedures
- Example Score: 86% vs 49%

<span role="text">**Security Culture**</span>

- Evaluates awareness, training, and security behavior across users
- Example Score: 23% vs 50%

[![HEHE (17).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-03/scaled-1680-/1XU58G9IFFYSkkVJ-hehe-17.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-03/1XU58G9IFFYSkkVJ-hehe-17.png)

### **Library - Cyber Security Compliance (Module)**

The Assessment Library provides a centralized repository of all previously created cybersecurity assessments. It enables users to search, review, manage, and export assessment records for tracking, reporting, and audit purposes.

<span role="text">**1. Library Header &amp; Actions**</span>

<span role="text">**Purpose**</span>

Provides quick access to key actions and navigation within the Library.

<span role="text">**Components**</span>

- **Page Title:** *Library*
- **Description:** Overview of the section’s purpose
- **Export Assessment Button:** Allows users to export selected assessment data

<span role="text">**How to Use**</span>

- Use this section to understand the purpose of the page
- Export assessments for reporting, sharing, or audit documentation

---

<span role="text">**2. Search and Filter**</span>

<span role="text">**Purpose**</span>

Enables users to quickly locate specific assessments.

<span role="text">**Components**</span>

- **Search Bar:** Search by assessment title or keywords
- **Filter Option:** Apply filters to refine results (e.g., status, date, version)

<span role="text">**How to Use**</span>

- Enter keywords to locate specific assessments
- Apply filters to narrow down results for large datasets

---

<span role="text">**3. Assessment List Table**</span>

<span role="text">**Purpose**</span>

Displays all stored assessments in a structured, tabular format.

<span role="text">**Columns Explained**</span>

- **Assessment Title**  
    Name of the assessment (e.g., *February 2026 – February 2027 Assessment*)
- **Assessment Period**  
    Timeframe covered by the assessment
- **Version**  
    Version identifier (e.g., v1)
- **Request Status**  
    Indicates whether the assessment has been requested or initiated
    
    
    - Example: *Not Requested*
- **Assessed At**  
    Date when the assessment was conducted
- **Assessed By**  
    User or entity responsible for completing the assessment

---

<span role="text">**4. Assessment Actions**</span>

<span role="text">**Purpose**</span>

Provides quick actions for managing individual assessments.

<span role="text">**Available Actions**</span>

- **View (👁️)**  
    Opens the detailed assessment dashboard
- **Download (⬇️)**  
    Exports the assessment results
- **Delete (🗑️)**  
    Removes the assessment from the library

<span role="text">**How to Use**</span>

- Use **View** to analyze results
- Use **Download** for reporting or sharing
- Use **Delete** to remove outdated or unnecessary records

---

<span role="text">**5. Pagination Controls**</span>

<span role="text">**Purpose**</span>

Manages how many records are displayed and navigation across pages.

<span role="text">**Components**</span>

- **Items per Page Selector** (e.g., 10/page)
- **Page Navigation Controls**
- **Total Items Indicator** (e.g., 1–1 of 1)

<span role="text">**How to Use**</span>

- Adjust the number of items displayed per page
- Navigate between pages when multiple assessments exist

[![HEHE (18).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-03/scaled-1680-/WIRfNqOvRU3Nk5oK-hehe-18.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-03/WIRfNqOvRU3Nk5oK-hehe-18.png)

Client can also export their assessment by clicking the "**Export Assessment**" button

[![HEHE (19).png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-03/scaled-1680-/pevuDt10c8m9Zhu6-hehe-19.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-03/pevuDt10c8m9Zhu6-hehe-19.png)

**Conclusion**

The AQUILA Security Maturity Assessment Platform provides a comprehensive and structured approach to assessing, monitoring, and managing an organization’s security posture. Through its integrated modules—Assessment, Dashboard, and Library—the platform enables continuous visibility, benchmarking, and improvement of cybersecurity capabilities.

The **Assessment module** establishes the foundation by guiding users through structured evaluations across key security domains, including risk analysis, compliance, auditing, vulnerability management, incident response, governance, and security culture. It ensures that organizations can systematically measure their maturity using standardized criteria.

The **Dashboard module** transforms assessment data into actionable insights. It provides a consolidated view of overall maturity, domain-level performance, and peer benchmarking. Visualizations such as maturity scores, governance breakdowns, and comparative analytics allow stakeholders to quickly identify strengths, weaknesses, and priority areas for remediation.

The **Library module** supports long-term governance by maintaining a centralized repository of all assessments. It enables efficient tracking, version control, and retrieval of historical data, which is essential for audit readiness, compliance validation, and continuous improvement initiatives.

Overall, the platform demonstrates that the organization has:

- A **solid cybersecurity maturity level**, exceeding peer benchmarks
- Strong capabilities in **governance, auditing, and identity management**
- Identified improvement areas in **vulnerability management and security culture**

By leveraging these insights, organizations can prioritize remediation efforts, strengthen operational security, and align more effectively with industry standards such as ISO 27001 and SOC 2.

The platform ultimately supports a **continuous improvement lifecycle**, enabling organizations to move from reactive security practices toward a more **proactive, risk-driven, and maturity-based cybersecurity posture**.