Your organization has recently adopted a strict security posture due to concerns about data breaches originating from third-party applications. You are tasked with configuring Google Workspace to ensure that only approved third-party applications can access user data. How should you manage third-party applications to ensure security compliance?