6 Best Practices for Automating Security and Compliance Within Your Information Management System