Hi,
To strict restrict security policy, you can modify the added policies for the following entries:
1. Source IP address. Set the source IP address to the firewall connection IP address.
2. Disable the security policy if needed.
In addition, this security policy is not loose in my opinion, cause the source zone is specified to the local, which means the firewall itself is the only allowed device.