In a Crowdfunding platform company, a customer wants to secure their ERP system hosted on Compute Engine by adding a security layer that only allows traffic from Cloud Identity-Aware Proxy. What steps should the customer take to meet this requirement?