This is just a basic rules to achieve the scenarios. any additional changes on it should be implemented with proper validations. Since creating custom rules are competently based on individual requirements. For any further details please refer Help.qlik.com
Note: Security Rules can be implemented in different methods based on business requirement. There is no standard steps followed, however when working with the rule we need to ensure how the resource and filters are affecting the existing default and custom rules.
Refer Attached Document.