- Newest
- Most votes
- Most comments
You can find this informatio simply within the AWS Console, search for the AWS Organization service and check the account properties like this:
Per Docs:
All AWS Organizations actions are logged by CloudTrail and are documented in the AWS Organizations API Reference. For example, calls to CreateAccount
(including the CreateAccountResult
event), ListHandshakesForAccount
, CreatePolicy
, and InviteAccountToOrganization
generate entries in the CloudTrail log files.
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_security_incident-response.html
CloudTrail keeps a record of events for 90 days unless if you "create an event data store or a trail."
I tried to search in the CloudTrail, but there is no event with any of the names mentioned. Can it be related to the fact I can see only "We couldn't load AWS accounts. You don't have permissions to see this resource, because the management account has not granted you the permissions to view accounts." in the "AWS Organizations => AWS accounts" page?
Relevant content
- asked 2 years ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 10 months ago
- AWS OFFICIALUpdated 2 years ago
I cannot see any AWS accounts even though I'm logged in as a root user. The only thing I can see is: "We couldn't load AWS accounts. You don't have permissions to see this resource, because the management account has not granted you the permissions to view accounts."
Is it possible that the Organisation the account is connected with disabled the permission for me?