Visible to the public Removing the Human Element: Securing Deployed Cryptographic Systems through the use of Cryptographic Automation