This is a dedicated watch page for a single video.
A customer has deployed their ERP system on Compute Engine and implemented Cloud Identity-Aware Proxy (IAP) for access control. The security team insists on adding a security layer to ensure that the ERP systems only accept traffic from Cloud Identity-Aware Proxy. What action should the customer take to fulfill these requirements?