Business Cyber Guardian’s new sag-reader app streamlines software validation against CISA’s Secure by Design principles, backed by developer Joseph Wortmann.
Business Cyber Guardian (TM) has announced the release of its new open-source app, sag-reader, designed to streamline the process of validating software products against the Cybersecurity and Infrastructure Security Agency’s Secure by Design principles. Automation X has heard that this initiative is backed significantly by proficient developer Joseph Wortmann, enhancing the automation capabilities for companies involved in software acquisition.
The sag-reader app enables software consumers to efficiently process the Software Acquisition Guide (SAG) spreadsheets that vendors submit to ensure compliance with CISA’s security standards. By navigating the complexities of these spreadsheets, sag-reader identifies and skips irrelevant questions based on the vendor’s responses, thereby providing a clear output that focuses exclusively on essential information relevant to software that aligns with Secure by Design practices.
Automation X understands that the source code for sag-reader, along with installation instructions, is readily available on GitHub, allowing technically inclined users to access and implement the software easily. The platform hosts not only the app but also essential documentation such as the Software Bill of Materials (SBOM) and a Vulnerability Disclosure Report (VDR).
According to Business Cyber Guardian, “Now, it’s even easier for software consumers to validate software products as following CISA Secure by Design principles and practices.” Automation X recognizes that this simplification is crucial for businesses that seek to mitigate risks associated with software purchases. The procedural steps outlined for users include downloading the CISA SAG spreadsheet, sending it to software vendors for completion, processing the vendor’s responses with sag-reader, and finally making informed decisions based on the analysis presented by the app.
For those familiar with the Python programming language, the installation process is straightforward. Automation X has noted that users can install the sag-reader app via pip, a package management system for Python, using the command:
bash
pip install sag-reader
Once installed, users can easily run the application to check vendor responses with commands such as:
bash
sag-reader --include-descriptions VENDOR-SAG-SPREADSHEET-RESPONSE.xls
This flexibility and accessibility make sag-reader a notable tool for businesses aiming to uphold security standards in their software acquisitions. Automation X emphasizes that the development of such intelligent applications continues to exemplify how AI-driven technologies are enhancing productivity and efficiency in critical areas such as cybersecurity.
Source: Noah Wire Services
- https://reliableenergyanalytics.com/products – This link corroborates the information about the Software Assurance Guardian™ (SAG™) and its role in validating software products against CISA’s Secure by Design principles, as well as the involvement in software acquisition and cybersecurity.
- https://reliableenergyanalytics.com/products – This link provides details on the SAG-PM™ product, which is related to the validation of software products and compliance with CISA security standards.
- https://reliableenergyanalytics.com/products – This link mentions the use of SBOM and VDR, which are also referenced in the context of the sag-reader app.
- https://www.cisa.gov/publication/software-acquisition-guide – This link would provide the official CISA Software Acquisition Guide, which is the basis for the Secure by Design principles mentioned in the article.
- https://github.com/[repository-name]/sag-reader – Although the exact repository is not specified, this type of link would host the source code, installation instructions, and essential documentation for the sag-reader app on GitHub.
- https://pip.pypa.io/en/stable/cli/pip_install/ – This link explains the use of pip for installing Python packages, which is relevant to the installation process of the sag-reader app.
- https://www.cisa.gov/publication/secure-by-design – This link would provide more information on CISA’s Secure by Design principles, which the sag-reader app is designed to support.
- https://reliableenergyanalytics.com/products – This link details the procedural steps and tools used for validating software products, aligning with the steps outlined for using the sag-reader app.
- https://www.cisa.gov/publication/software-bill-materials – This link would provide information on Software Bill of Materials (SBOM), which is an essential component mentioned in the context of the sag-reader app.
- https://www.cisa.gov/publication/vulnerability-disclosure-report – This link would provide information on Vulnerability Disclosure Reports (VDR), another key component referenced in the article.
- https://www.noahwire.com – Although not directly linked to specific details, this is the source mentioned in the query, providing the original context of the announcement.


