grapppp It totally depends on your threat model and what you're trying to accomplish. There is no one "right" way to do profiles...
For example, I separate sensitive apps away from main profile and also separate apps that I consider more hostile into other profiles.