Overview
Overview
+Account contact details should be accurate and kept up to date so AWS can reach the organization for billing, operations, and security-relevant events.
Remediation guidance
AWS remediation
+### Console +1. Sign in as the account root user. +2. Open AWS Account settings. +3. Update primary contact details (name, email, phone, address). +4. Save and periodically re-validate details. + +### AWS CLI +~~~bash +aws account put-contact-information \
- --contact-information file://contact-information.json +~~~
+Example file: +~~~json +{
- "FullName": "Security Team",
- "AddressLine1": "Street 1",
- "City": "City",
- "StateOrRegion": "State",
- "DistrictOrCounty": "County",
- "PostalCode": "00000",
- "CountryCode": "US",
- "PhoneNumber": "+1-000-000-0000",
- "CompanyName": "Example",
- "WebsiteUrl": "https://example.com" +} +~~~
+### References +- https://docs.aws.amazon.com/accounts/latest/reference/manage-acct-update-contact.html +- https://docs.aws.amazon.com/cli/latest/reference/account/put-contact-information.html
Multiple Remediation Paths
AWS
SERVICE-WIDE (RECOMMENDED when many resources are affected): Deploy centralized guardrails and remediation using AWS Config Conformance Packs and (if applicable) AWS Organizations SCPs.
aws configservice put-organization-conformance-pack --organization-conformance-pack-name <pack-name> --template-s3-uri s3://<bucket>/<template>.yaml
ASSET-LEVEL: Apply the resource-specific remediation steps above to only the affected assets.
PREVENTIVE: Add CI/CD policy checks (CloudFormation/Terraform validation) before deployment to prevent recurrence.
References for Service-Wide Patterns
- AWS Config Conformance Packs: https://docs.aws.amazon.com/config/latest/developerguide/conformance-packs.html
- AWS Organizations SCP examples: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps_examples.html
Operational Rollout Workflow
Use this sequence to reduce risk and avoid repeated drift.
1. Contain at Service-Wide Scope First (Recommended)
- AWS: deploy/adjust organization conformance packs and policy guardrails.
aws configservice put-organization-conformance-pack --organization-conformance-pack-name <pack-name> --template-s3-uri s3://<bucket>/<template>.yaml
2. Remediate Existing Affected Assets
- Execute the control-specific Console/CLI steps documented above for each flagged resource.
- Prioritize internet-exposed and production assets first.
3. Validate and Prevent Recurrence
- Re-scan after each remediation batch.
- Track exceptions with owner and expiry date.
- Add preventive checks in IaC/CI pipelines.
Query logic
These are the stored checks tied to this control.
No stored query bodies are attached to this entry.