How to Scale Security Workflows