{"id":449,"date":"2025-06-24T08:58:23","date_gmt":"2025-06-24T08:58:23","guid":{"rendered":"https:\/\/sreschool.com\/blog\/?p=449"},"modified":"2026-05-05T07:29:42","modified_gmt":"2026-05-05T07:29:42","slug":"%f0%9f%a7%9f-zombie-services-in-devsecops-a-comprehensive-guide","status":"publish","type":"post","link":"https:\/\/sreschool.com\/blog\/%f0%9f%a7%9f-zombie-services-in-devsecops-a-comprehensive-guide\/","title":{"rendered":"\ud83e\udddf Zombie Services in DevSecOps: A Comprehensive Guide"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">\ud83d\udcd8 1. Introduction &amp; Overview<\/h2>\n\n\n\n<p>In the ever-evolving world of DevSecOps, <em>&#8220;Zombie Services&#8221;<\/em> have emerged as a silent yet critical challenge impacting security, performance, and cost. These services lurk in environments long after their relevance has passed, increasing the attack surface and technical debt.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udea8 What are Zombie Services?<\/h3>\n\n\n\n<p><strong>Zombie Services<\/strong> are outdated, forgotten, or unmonitored services (e.g., APIs, microservices, cloud functions) that:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Are still <strong>running or accessible<\/strong>.<\/li>\n\n\n\n<li>Are <strong>no longer maintained<\/strong> or actively used.<\/li>\n\n\n\n<li>Pose <strong>security risks<\/strong> due to outdated configurations or vulnerabilities.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udcda 2. History or Background<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Legacy systems<\/strong> often left services behind post-migration.<\/li>\n\n\n\n<li>In <strong>cloud-native architectures<\/strong>, rapid deployment often leads to service sprawl.<\/li>\n\n\n\n<li>With <strong>CI\/CD pipelines<\/strong>, stale branches or forgotten environments result in unattended services.<\/li>\n\n\n\n<li>The term emerged as part of <strong>cyber hygiene<\/strong> in DevSecOps \u2014 focusing on risk reduction.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd12 Why Zombie Services Matter in DevSecOps<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Security Risks<\/strong>: Unpatched vulnerabilities can be exploited.<\/li>\n\n\n\n<li><strong>Compliance Gaps<\/strong>: May violate regulations like GDPR, HIPAA.<\/li>\n\n\n\n<li><strong>Cloud Costs<\/strong>: Incur unnecessary resource usage.<\/li>\n\n\n\n<li><strong>Operational Noise<\/strong>: Makes threat detection harder.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udde0 3. Core Concepts &amp; Terminology<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Term<\/th><th>Definition<\/th><\/tr><\/thead><tbody><tr><td><strong>Zombie Service<\/strong><\/td><td>A dormant or forgotten service still running in the environment.<\/td><\/tr><tr><td><strong>Shadow IT<\/strong><\/td><td>Unauthorized systems or software outside official IT control \u2014 overlaps with zombie services.<\/td><\/tr><tr><td><strong>Orphaned Resource<\/strong><\/td><td>Infrastructure components with no clear owner or function.<\/td><\/tr><tr><td><strong>DevSecOps<\/strong><\/td><td>Integration of security into DevOps from the beginning of the development cycle.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83e\udde9 Fit in the DevSecOps Lifecycle<\/h3>\n\n\n\n<p>Zombie services affect <strong>all DevSecOps stages<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Plan<\/strong>: Missed in documentation.<\/li>\n\n\n\n<li><strong>Build<\/strong>: Left from abandoned features.<\/li>\n\n\n\n<li><strong>Test<\/strong>: Not included in test coverage.<\/li>\n\n\n\n<li><strong>Release<\/strong>: Forgotten during phased rollouts.<\/li>\n\n\n\n<li><strong>Deploy<\/strong>: Remain deployed despite inactivity.<\/li>\n\n\n\n<li><strong>Operate<\/strong>: Lack of alerts\/visibility.<\/li>\n\n\n\n<li><strong>Monitor<\/strong>: Not monitored, causing blind spots.<\/li>\n\n\n\n<li><strong>Secure<\/strong>: Increase attack surface.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83c\udfd7\ufe0f 4. Architecture &amp; How It Works<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd27 Components of Zombie Service Detection Framework<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Inventory Tracker<\/strong>: Discovers all services (via APIs, IaC, agent scans).<\/li>\n\n\n\n<li><strong>Usage Analyzer<\/strong>: Tracks traffic, access logs, and versioning data.<\/li>\n\n\n\n<li><strong>Risk Scorer<\/strong>: Evaluates risk based on last access, patch state, owner metadata.<\/li>\n\n\n\n<li><strong>Alert System<\/strong>: Integrates with SIEM\/Slack\/Jira for ticketing or auto-remediation.<\/li>\n\n\n\n<li><strong>Policy Engine<\/strong>: Enforces TTL (Time to Live) and auto-deprecation.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd04 Workflow Diagram (Text Representation)<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>&#091;Code Repository] --\u2192 &#091;CI\/CD Pipeline]\n                          |\n                          \u2193\n              &#091;Service Deployment Tracker]\n                          |\n          +---------------+---------------+\n          |                               |\n  &#091;Monitoring Tool]              &#091;IAM\/Traffic Logs]\n          \u2193                               \u2193\n     &#091;Usage Analyzer] --\u2192 &#091;Risk Evaluator] --\u2192 &#091;Alert\/Auto Remediation]\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd17 Integration Points with DevSecOps Tools<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Tool Type<\/th><th>Integration Example<\/th><\/tr><\/thead><tbody><tr><td>CI\/CD (GitHub Actions, GitLab)<\/td><td>Tag services with TTL metadata<\/td><\/tr><tr><td>Cloud (AWS, Azure, GCP)<\/td><td>Use Cloud Asset Inventory + tags<\/td><\/tr><tr><td>Monitoring (Prometheus, Datadog)<\/td><td>Detect traffic drop to 0<\/td><\/tr><tr><td>Security (Aqua, Prisma, Snyk)<\/td><td>Identify unpatched orphan services<\/td><\/tr><tr><td>IaC (Terraform)<\/td><td>Enforce TTLs and owners in module inputs<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\u2699\ufe0f 5. Installation &amp; Getting Started<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd11 Prerequisites<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cloud provider access (e.g., AWS IAM read access)<\/li>\n\n\n\n<li>Access to logs\/metrics (CloudWatch, Prometheus, ELK)<\/li>\n\n\n\n<li>CI\/CD integration permissions<\/li>\n\n\n\n<li>Optional: Terraform, Kubernetes CLI, Slack webhook<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udee0\ufe0f Step-by-Step Setup<\/h3>\n\n\n\n<p><strong>Step 1: Inventory Services<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># AWS Example using AWS CLI\naws resourcegroupstaggingapi get-resources \\\n  --tag-filters Key=Environment,Values=prod\n<\/code><\/pre>\n\n\n\n<p><strong>Step 2: Track Usage &amp; Metadata<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># GCP example with cloud asset inventory\ngcloud asset search-all-resources --scope=projects\/YOUR_PROJECT_ID\n<\/code><\/pre>\n\n\n\n<p><strong>Step 3: Define TTL &amp; Owner Policy (Terraform)<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>resource \"aws_lambda_function\" \"example\" {\n  function_name = \"my_lambda\"\n  tags = {\n    TTL     = \"30d\"\n    Owner   = \"devops-team\"\n  }\n}\n<\/code><\/pre>\n\n\n\n<p><strong>Step 4: Alert on Expiry (via GitHub Action + Slack)<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># .github\/workflows\/zombie-check.yml\njobs:\n  zombie-scan:\n    runs-on: ubuntu-latest\n    steps:\n    - name: Scan for Zombie Services\n      run: .\/scripts\/check-zombie.sh\n    - name: Slack Alert\n      uses: slackapi\/slack-github-action@v1.23.0\n<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83c\udf10 6. Real-World Use Cases<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 Example 1: Banking Sector<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Forgotten internal APIs still active in production.<\/li>\n\n\n\n<li>Detected via usage logs + SSL certificate scan.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 Example 2: Healthcare SaaS<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Old microservices running on Kubernetes from a deprecated version.<\/li>\n\n\n\n<li>Security team flagged them for CVE vulnerabilities.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 Example 3: E-commerce Platform<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Zombie cloud functions incurred $2,000\/month in AWS bills.<\/li>\n\n\n\n<li>Identified via billing + Lambda invocations metric = 0.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 Example 4: Government Infrastructure<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Legacy FTP services still accessible externally.<\/li>\n\n\n\n<li>Breach simulation exposed vulnerability entry point.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\u2696\ufe0f 7. Benefits &amp; Limitations<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 Key Benefits<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Improved Security Posture<\/strong><\/li>\n\n\n\n<li><strong>Cost Optimization<\/strong><\/li>\n\n\n\n<li><strong>Audit Readiness<\/strong><\/li>\n\n\n\n<li><strong>Operational Clarity<\/strong><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u26a0\ufe0f Limitations<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>False Positives<\/strong>: Some services are sporadically accessed.<\/li>\n\n\n\n<li><strong>Ownership Ambiguity<\/strong>: Tags or ownership data often missing.<\/li>\n\n\n\n<li><strong>Tooling Overhead<\/strong>: Requires integration of multiple tools.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udded 8. Best Practices &amp; Recommendations<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd10 Security &amp; Compliance<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enforce ownership<\/strong>: via GitHub\/GitLab metadata or IaC tagging.<\/li>\n\n\n\n<li><strong>Automated TTL Enforcement<\/strong>: Auto-delete services after expiration.<\/li>\n\n\n\n<li><strong>Log Everything<\/strong>: CloudTrail, VPC logs, firewall hits.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u2699\ufe0f Operational &amp; Automation Tips<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use <strong>cron-based scans<\/strong> with GitHub Actions or Jenkins.<\/li>\n\n\n\n<li>Alert teams weekly on unused services.<\/li>\n\n\n\n<li>Integrate with <strong>policy-as-code<\/strong> (Open Policy Agent, Sentinel).<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd04 9. Comparison with Alternatives<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Feature<\/th><th>Zombie Detection Tools<\/th><th>Infra Scanners<\/th><th>SIEM<\/th><\/tr><\/thead><tbody><tr><td>Service-Level Detection<\/td><td>\u2705<\/td><td>\u274c<\/td><td>\u274c<\/td><\/tr><tr><td>Usage-Based Detection<\/td><td>\u2705<\/td><td>\u274c<\/td><td>\u2705<\/td><\/tr><tr><td>Automated Cleanup<\/td><td>\u2705<\/td><td>\u274c<\/td><td>\u274c<\/td><\/tr><tr><td>Compliance Reporting<\/td><td>\u2705<\/td><td>\u2705<\/td><td>\u2705<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd0d When to Choose Zombie Service Audits?<\/h3>\n\n\n\n<p>Use them when:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Your environments are <strong>long-lived<\/strong> (e.g., staging, prod).<\/li>\n\n\n\n<li>You manage <strong>multi-cloud or hybrid infrastructure<\/strong>.<\/li>\n\n\n\n<li><strong>Security compliance<\/strong> (e.g., ISO, PCI-DSS) is required.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83c\udfc1 10. Conclusion<\/h2>\n\n\n\n<p>Zombie services are silent yet dangerous liabilities in DevSecOps pipelines. Proactively managing and auditing them boosts security, reduces cloud costs, and ensures compliance.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd2e Future Trends<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AI-based anomaly detection of zombie services.<\/li>\n\n\n\n<li>Integration with SBOMs (Software Bill of Materials).<\/li>\n\n\n\n<li>Full auto-remediation pipelines with approvals.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udcd8 1. Introduction &amp; Overview In the ever-evolving world of DevSecOps, &#8220;Zombie Services&#8221; have emerged as a silent yet critical [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-449","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\ud83e\udddf Zombie Services in DevSecOps: A Comprehensive Guide - SRE School<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sreschool.com\/blog\/\ud83e\udddf-zombie-services-in-devsecops-a-comprehensive-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\ud83e\udddf Zombie Services in DevSecOps: A Comprehensive Guide - SRE School\" \/>\n<meta property=\"og:description\" content=\"\ud83d\udcd8 1. Introduction &amp; Overview In the ever-evolving world of DevSecOps, &#8220;Zombie Services&#8221; have emerged as a silent yet critical [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sreschool.com\/blog\/\ud83e\udddf-zombie-services-in-devsecops-a-comprehensive-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"SRE School\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-24T08:58:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T07:29:42+00:00\" \/>\n<meta name=\"author\" content=\"priteshgeek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"priteshgeek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sreschool.com\/blog\/%f0%9f%a7%9f-zombie-services-in-devsecops-a-comprehensive-guide\/\",\"url\":\"https:\/\/sreschool.com\/blog\/%f0%9f%a7%9f-zombie-services-in-devsecops-a-comprehensive-guide\/\",\"name\":\"\ud83e\udddf Zombie Services in DevSecOps: A Comprehensive Guide - SRE School\",\"isPartOf\":{\"@id\":\"https:\/\/sreschool.com\/blog\/#website\"},\"datePublished\":\"2025-06-24T08:58:23+00:00\",\"dateModified\":\"2026-05-05T07:29:42+00:00\",\"author\":{\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db\"},\"breadcrumb\":{\"@id\":\"https:\/\/sreschool.com\/blog\/%f0%9f%a7%9f-zombie-services-in-devsecops-a-comprehensive-guide\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sreschool.com\/blog\/%f0%9f%a7%9f-zombie-services-in-devsecops-a-comprehensive-guide\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sreschool.com\/blog\/%f0%9f%a7%9f-zombie-services-in-devsecops-a-comprehensive-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sreschool.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\ud83e\udddf Zombie Services in DevSecOps: A Comprehensive Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sreschool.com\/blog\/#website\",\"url\":\"https:\/\/sreschool.com\/blog\/\",\"name\":\"SRESchool\",\"description\":\"Master SRE. Build Resilient Systems. Lead the Future of Reliability\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sreschool.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db\",\"name\":\"priteshgeek\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/sreschool.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g\",\"caption\":\"priteshgeek\"},\"url\":\"https:\/\/sreschool.com\/blog\/author\/priteshgeek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\ud83e\udddf Zombie Services in DevSecOps: A Comprehensive Guide - SRE School","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sreschool.com\/blog\/\ud83e\udddf-zombie-services-in-devsecops-a-comprehensive-guide\/","og_locale":"en_US","og_type":"article","og_title":"\ud83e\udddf Zombie Services in DevSecOps: A Comprehensive Guide - SRE School","og_description":"\ud83d\udcd8 1. Introduction &amp; Overview In the ever-evolving world of DevSecOps, &#8220;Zombie Services&#8221; have emerged as a silent yet critical [&hellip;]","og_url":"https:\/\/sreschool.com\/blog\/\ud83e\udddf-zombie-services-in-devsecops-a-comprehensive-guide\/","og_site_name":"SRE School","article_published_time":"2025-06-24T08:58:23+00:00","article_modified_time":"2026-05-05T07:29:42+00:00","author":"priteshgeek","twitter_card":"summary_large_image","twitter_misc":{"Written by":"priteshgeek","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sreschool.com\/blog\/%f0%9f%a7%9f-zombie-services-in-devsecops-a-comprehensive-guide\/","url":"https:\/\/sreschool.com\/blog\/%f0%9f%a7%9f-zombie-services-in-devsecops-a-comprehensive-guide\/","name":"\ud83e\udddf Zombie Services in DevSecOps: A Comprehensive Guide - SRE School","isPartOf":{"@id":"https:\/\/sreschool.com\/blog\/#website"},"datePublished":"2025-06-24T08:58:23+00:00","dateModified":"2026-05-05T07:29:42+00:00","author":{"@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db"},"breadcrumb":{"@id":"https:\/\/sreschool.com\/blog\/%f0%9f%a7%9f-zombie-services-in-devsecops-a-comprehensive-guide\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sreschool.com\/blog\/%f0%9f%a7%9f-zombie-services-in-devsecops-a-comprehensive-guide\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sreschool.com\/blog\/%f0%9f%a7%9f-zombie-services-in-devsecops-a-comprehensive-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sreschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"\ud83e\udddf Zombie Services in DevSecOps: A Comprehensive Guide"}]},{"@type":"WebSite","@id":"https:\/\/sreschool.com\/blog\/#website","url":"https:\/\/sreschool.com\/blog\/","name":"SRESchool","description":"Master SRE. Build Resilient Systems. Lead the Future of Reliability","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sreschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/6a53e3870889dd6a65b2e04b7bc3d7db","name":"priteshgeek","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/sreschool.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/231a0e8b7a02636f2fbacf8dcf4494cb1cc0d49ecc9a8165fbaeaeeaf102641a?s=96&d=mm&r=g","caption":"priteshgeek"},"url":"https:\/\/sreschool.com\/blog\/author\/priteshgeek\/"}]}},"_links":{"self":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/comments?post=449"}],"version-history":[{"count":1,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/449\/revisions"}],"predecessor-version":[{"id":450,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/posts\/449\/revisions\/450"}],"wp:attachment":[{"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/media?parent=449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/categories?post=449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sreschool.com\/blog\/wp-json\/wp\/v2\/tags?post=449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}