5 Prerequisites For Trusting Security Automation