Ultimate access to all questions.
A customer is using Cloud Identity-Aware Proxy (IAP) to secure their ERP system hosted on Google Cloud Compute Engine. Their security team wants to add a layer of security to ensure the ERP system only accepts traffic that has passed through IAP. What should they do to meet this requirement?