As a best practice, you should create your security rules and test that they
match the expected flows (based on the source and destination criteria) before
adding your HIP profiles. By doing this, you can better determine the proper
placement of the HIP-enabled rules within the policy.