modules/Devolutions.CIEM.Graph/Data/attack_path_remediation_scripts/disabled-account-still-holding-active-role-assignments.ps1

<#
.SYNOPSIS
Remediates the attack path finding "{{PATTERN_NAME}}".

.DESCRIPTION
This generated remediation script targets the specific attack path chain below:
{{PATH_CHAIN}}

It removes the Azure RBAC role assignments that keep this disabled identity connected
to Azure permissions. The commands are generated from the role assignment edges in
the finding and execute with the Azure REST API under the selected CIEM authentication profile
context. Review the listed role assignments before running the script, then
rerun Azure discovery to confirm the attack path is gone.
#>


{{ROLE_ASSIGNMENT_DELETE_COMMANDS}}