All posts

The Simplest Way to Make Cloud Run FortiGate Work Like It Should

You fire up a Cloud Run service, route some traffic, and everything looks fine until you realize nothing outside your project should ever touch it. Enter FortiGate. It promises strong perimeter control, but pairing it with Cloud Run often feels like asking two cloud bouncers to share a guest list. Done wrong, you get dropped packets. Done right, you get frictionless, policy-backed access. Cloud Run handles containerized apps that scale automatically. FortiGate, built by Fortinet, handles inspec

Free White Paper

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

You fire up a Cloud Run service, route some traffic, and everything looks fine until you realize nothing outside your project should ever touch it. Enter FortiGate. It promises strong perimeter control, but pairing it with Cloud Run often feels like asking two cloud bouncers to share a guest list. Done wrong, you get dropped packets. Done right, you get frictionless, policy-backed access.

Cloud Run handles containerized apps that scale automatically. FortiGate, built by Fortinet, handles inspection, logging, and security policy enforcement. When combined, they give your stack both speed and defense: ephemeral compute guarded by persistent control. The trick is wiring identity and routing together so Cloud Run doesn’t lose the benefits of isolation while FortiGate keeps visibility.

In a proper Cloud Run FortiGate integration, traffic flows through FortiGate using static outbound IPs or secure tunnels before reaching Cloud Run’s managed endpoints. Authentication travels with requests, usually via OIDC tokens tied to a cloud identity provider like Okta or Google Identity. Each service call is verified, logged, and filtered. You get least-privilege access and auditable egress routes without messy VPN configurations.

The best practice is clear. Let Cloud Run stay dynamic while FortiGate enforces policy at the edge. Map roles in IAM to FortiGate policies, rotate keys through Secret Manager, and define outbound tags instead of hardcoded IP lists. Then inspection and rate control happen intelligently, not manually.

Featured snippet answer (for the busy reader):
To connect Cloud Run with FortiGate, route traffic through a static NAT or tunnel managed by FortiGate, use service identities for each Cloud Run app, and apply OIDC-based verification for authenticated requests. This keeps workloads secure and compliant without sacrificing elasticity.

Continue reading? Get the full guide.

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Benefits:

  • Consistent security policy across ephemeral containers
  • Centralized metrics, logs, and audit visibility
  • Simplified compliance with SOC 2 and ISO frameworks
  • Predictable IPs for outbound filtering and API allowlists
  • Less downtime from misconfigured routes or expired credentials

For developers, this setup strips away drag. You no longer wait for firewall rule reviews or manual approvals. Requests come pre-tagged with identity, CI flows speed up, and debugging happens from the console instead of a ticket queue. That’s real developer velocity.

If your team is automating access control or security policy enforcement, platforms like hoop.dev turn these rules into dynamic guardrails. They link identity to environment automatically so your FortiGate and Cloud Run stack behave like a single protected service, not two unrelated systems arguing over ports.

Common question:
How does FortiGate improve Cloud Run security?
It adds network-layer control, allows consistent logging, and ensures egress compliance. You get zero-trust behavior at scale without reconfiguring ephemeral instances each deployment.

As AI assistants start handling deployments, that identity linkage becomes vital. Automating access through readable policies means the bot can deploy safely while you stay SOC 2 happy. No rogue credentials, no accidental exposure.

Cloud Run FortiGate might sound like extra plumbing, but it’s the difference between safe speed and unsafe speed. Set it up once, then watch your infrastructure stay steady when traffic spikes.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts