Your Policies Can Hurt You, Part 2: Overzealous Policies Can Create Breach-Prone Environments