modules/Devolutions.CIEM.Graph/Data/attack_path_remediation_scripts/guest-user-holding-a-privileged-role.ps1
|
<# .SYNOPSIS Remediates the attack path finding "{{PATTERN_NAME}}". .DESCRIPTION This generated remediation script targets the specific attack path chain below: {{PATH_CHAIN}} It removes Azure RBAC role assignments that grant privileged access directly to a guest user. The commands are generated from the role assignment edges in the finding and execute with the Azure REST API under the selected CIEM authentication profile context. Review the guest user and role scope before running the script, then rerun Azure discovery to confirm the attack path is gone. #> {{ROLE_ASSIGNMENT_DELETE_COMMANDS}} |