I have been researching the usage of Security Profiles and have come up with very little other than how to create them. Can anyone give me scenarios where they found profiles to be useful or even scenarios where you tried to use them and they became cumbersome?