This is a complete non-answer and belongs nowhere near the question. The main question is:
If someone has complete legitimate control of the corporate e-mail domain, and a working AWS IAM account, how do they determine which of the potentially thousands of historic corporate e-mail addresses that was used for the AWS root account? For example was it admin.firstname.lastname1@west.company.com, oldadmin.firstname.lastname2@west.company.com, cto.firstname.lastname3@west.company.com, itworker.firstname.lastname4@east.company.com, itworker.firstname.lastname5@east.company.com, accountant.firstname.lastname6@south.company.com, etc. etc.
Thank you for your comment. We'll review and update the Knowledge Center article as needed.
This answer is unhelpful for my situation. My company had the steward of an AWS account pass away, without leaving behind documentation on what email address is associated with the account. I have an account number, but no account name and no email address. I need a way to discover the email address that's associated with this account.
Thank you for your comment. We'll review and update the Knowledge Center article as needed.
Frankly, your process to recover the root account is flawed if the root account email address and password are not known. You should have a procedure that identifies the account owner by other means. For the biggest cloud provider out there, this simply is not good enough and we face losing all of our infrastructure because of an expired credit card that can't be updated.
Please also reply with something more constructive than:
"Thank you for your comment. We'll review and update the Knowledge Center article as needed."
Relevant content
- Accepted Answerasked 9 months ago
- Accepted Answerasked 5 years ago
- Accepted Answerasked 5 months ago
- Accepted Answerasked a year ago
- AWS OFFICIALUpdated 6 months ago
- AWS OFFICIALUpdated 3 months ago