security-engineer video for your team establishes an ingress firewall rule to permit SSH access from the corporate IP range to a designated bastion host on
Your team establishes an ingress firewall rule to permit SSH access from the corporate IP range to a designated bastion host on Compute Engine. To ensure that this firewall rule cannot be utilized by unauthorized engineers who might otherwise possess access to manage VMs in the development environment, what should your team do to fulfill this requirement?