As part of the security overhaul in your organization, you need to ensure that only devices with encrypted drives can access Google Workspace applications. This policy should cover a myriad of devices, from mobile phones to Chrome OS. Which step is paramount to enforce this policy?