Why It Matters?
A common technique during the reconnaissance phase of an attack is to gather as much information as possible by scanning and gathering as much information as possible on breached resources. This information can be used to assess whether a resource can be exploited further.
What Exactly Does This Policy Do?
This policy helps limit the scope of the information that can be collected from databases. Additionally, potential denial of service attacks could be limited by reducing the number of objects returned from read actions.