The request dropped into your queue at 03:14. A production GCP service was exposing its database without the right controls. The threat surface was wide, the load balancer unshielded. You need a plan, now.
Securing database access behind a GCP load balancer is not optional. It is the difference between controlled entry and open exposure. GCP gives you the tools: Identity and Access Management (IAM), private IPs, SSL policies, backend service configurations, firewall rules. But these only work when they are configured in concert, with the load balancer as the gatekeeper.
Start by placing the database in a private subnet within a VPC. This isolates it from public networks. Pair it with a Cloud SQL, Firestore, or Cloud Spanner instance that enforces IAM authentication. Next, use a global HTTPS or TCP load balancer to route approved traffic. This step ensures that all database queries pass through a consistent, inspectable channel.
Access controls must be strict. Use IAM roles that grant the least privilege needed. Deny broad network access; allow only service accounts bound to specific applications or users. At the firewall level, restrict source ranges to the load balancer’s IPs. Block direct database access from external addresses.