A financial services company is deploying a Zero Trust architecture. A key requirement is to ensure that only authenticated and authorized users on compliant devices can access internal applications. A security architect has configured GlobalProtect with Host Information Profile (HIP) checks and User-ID. During testing, a user on a non-compliant device is still able to access a sensitive application. The Security policy rule for this application correctly specifies the user's group. What is the most likely misconfiguration causing this policy failure?