SSL termination is one of those concepts that sounds heavier than it actually is. This article covers what SSL termination means in Cloud Load Balancing, where the decryption physically happens, why teams choose to do it at the load balancer, and how the Associate Cloud Engineer exam tests it.
It does not cover end-to-end encryption configurations where you re-encrypt traffic between the load balancer and your backends, or the specifics of managing managed SSL certificates through Cloud Load Balancing. Those are real concerns in production but they are not what the ACE exam asks about.
Clients connect to your application over HTTPS. That traffic is encrypted. Somewhere along the way, the encrypted data has to get decrypted so the application can read the request and respond to it. SSL termination is the choice about where that decryption happens.
With SSL termination at the load balancer, the load balancer performs the SSL handshake with the client, decrypts the incoming HTTPS traffic, and then forwards the unencrypted HTTP request to your backend. The backend never sees encrypted traffic. The backend just sees HTTP.
That is the entire concept. The load balancer is doing the cryptographic work, your backend is not.
Two reasons, and they matter in this order.
The first is certificate management. If you do not terminate SSL at the load balancer, you have to install and rotate SSL certificates on every backend instance. With three backends that is annoying. With thirty backends behind an autoscaler that is operationally painful. With SSL termination at the load balancer, you install the certificate once, in one place, and every backend behind it is reachable over HTTPS without ever needing its own cert.
The second is performance. The SSL handshake is computationally expensive. Decrypting traffic uses CPU. If your backend is doing it, that is CPU not spent serving application logic. Offloading the decryption to the load balancer frees the backend to focus on the actual work. For a small application this is invisible. For high-traffic applications it is not.
Of those two reasons, certificate management is the one that matters more for most teams. Performance is real but it is rarely the reason somebody first sets up SSL termination.
The pattern is the same regardless of what your backend is. Clients hit the load balancer over HTTPS. The load balancer terminates SSL. The load balancer forwards plain HTTP to GKE pods, App Engine services, Compute Engine VMs, or whatever else is sitting behind it. Cloud Load Balancing handles this for any HTTP(S) load balancer setup.
If you need encryption all the way to the backend (a compliance requirement, a strict zero-trust posture), you can re-encrypt between the load balancer and the backend. But the default and most common setup is terminate-at-the-LB and let the backend speak plain HTTP. The internal Google network between the load balancer and your backends is already protected.
The Associate Cloud Engineer exam tests SSL termination in two patterns.
The first is conceptual. A question describes an architecture where HTTPS clients hit a load balancer fronting backend services, and asks where SSL is decrypted or where certificates need to be managed. The answer is the load balancer. If you see SSL termination, HTTPS load balancer, certificate management on a load balancer in the question, that is the topic being tested.
The second is the certificate management framing. A scenario describes a team running many backend instances and asks how to simplify SSL certificate management. The answer is to terminate SSL at the load balancer so the certificate lives in one place rather than on every backend.
If you see in the question something about a team struggling to manage SSL certificates across many VMs or services, think SSL termination at the load balancer. If you see something about offloading work from backends or improving backend performance for HTTPS-heavy workloads, think SSL termination at the load balancer.
SSL termination decrypts HTTPS at the load balancer instead of at your backends. The certificate lives on the load balancer, and your backends speak plain HTTP behind it. The two reasons to do this are simpler certificate management (the bigger reason in practice) and freeing backend CPU from cryptographic work (the smaller one).
For the Associate Cloud Engineer exam, you mostly need to recognize the concept and know that certificate management is the standard motivation. You do not need to know the specific gcloud commands for it.
My Associate Cloud Engineer course covers SSL termination in the Cloud Load Balancing section alongside the OSI model framing for layer 4 versus layer 7 load balancers, which is the other load balancing topic the ACE exam tests with any consistency.