Service portfolio

ISO/IEC 20000-1 Clause 8.2.1 requires you to keep a documented service portfolio covering every service inside your Service Management System (SMS) scope, and to actively manage it through planning, control, maintenance, and continual improvement (ISO/IEC 20000-1:2018 Information technology — Service management). Operationally, this means one authoritative inventory of services, with clear ownership, status, and change control.

Key takeaways:

  • Your service portfolio must include all in-scope services and exist as controlled documented information (ISO/IEC 20000-1:2018 Information technology — Service management).
  • Treat the portfolio as a managed system: defined fields, owners, lifecycle states, review cadence, and change control.
  • Auditors will test completeness against reality (CMDB, contracts, catalogs, invoices) and will look for evidence of ongoing maintenance.

A service portfolio is the backbone of service governance: it’s the single place where you can prove what services you provide, which ones are in scope for the SMS, who owns them, and how they are controlled. Clause 8.2.1 is easy to “document” and still fail in practice. Most findings come from gaps between what the portfolio says and what the organization actually delivers, supports, buys from third parties, or exposes to customers.

For a Compliance Officer, CCO, or GRC lead, the fastest path is to define the portfolio as a controlled record set (not a slide deck), assign accountable owners, and reconcile it against operational sources of truth. Then you harden it with change control, periodic review, and a simple lifecycle model (proposed, live, retired) so it can be maintained and improved over time (ISO/IEC 20000-1:2018 Information technology — Service management).

If you already run ITIL-style processes, don’t confuse “service catalog” with “service portfolio.” The catalog is the customer-facing subset. The portfolio is the full set of in-scope services, including internal, supporting, and retired services where they still create risk or obligations.

Regulatory text

Requirement (verbatim): “The organization shall plan, implement, control, maintain and continually improve a service portfolio that includes the services within the scope of the service management system. The service portfolio shall be available as documented information.” (ISO/IEC 20000-1:2018 Information technology — Service management)

Operator interpretation: you must (1) define what your “service portfolio” is, (2) ensure it includes every service inside the SMS scope, (3) keep it as controlled documented information, and (4) run ongoing management around it (planning, control, maintenance, continual improvement) rather than treating it as a one-time inventory (ISO/IEC 20000-1:2018 Information technology — Service management).

Plain-English requirement interpretation

You need one authoritative list of services that fall under ISO 20000 scope. Each service entry must be accurate, owned, and kept current. “Available as documented information” means an auditor can access it, you can show version control or record control, and you can prove it is maintained through defined processes (ISO/IEC 20000-1:2018 Information technology — Service management).

Who this applies to (entity + operational context)

Applies to: any organization operating a Service Management System under ISO/IEC 20000-1, including internal IT, managed service providers, SaaS providers with formal service management, and shared services groups (ISO/IEC 20000-1:2018 Information technology — Service management).

Operationally relevant when you:

  • Deliver customer-facing IT services (external or internal).
  • Rely on third parties to deliver part of the service (cloud hosting, support desks, SOC, field services).
  • Have multiple service lines, regions, or product teams and struggle to reconcile “what we offer” vs “what we run.”

What you actually need to do (step-by-step)

Step 1: Define the portfolio boundary and the “service” definition

  1. Confirm SMS scope (geographies, business units, platforms, service lines). Your portfolio must include all services within that scope (ISO/IEC 20000-1:2018 Information technology — Service management).
  2. Write a service definition that your teams can apply consistently. Practical test: “If it has an SLA/OLA, a support model, or a customer, it’s a service.”
  3. Set inclusion rules for borderline items:
    • Internal platforms (identity, logging, CI/CD) that other services depend on.
    • Shared capabilities sold indirectly (API gateways, data pipelines).
    • “Retired” services that still have data retention, contract, or security obligations.

Step 2: Choose the system of record and make it controlled documented information

  1. Pick one system of record: GRC tool, ITSM tool, or controlled repository. What matters is that it is accessible and controlled as documented information (ISO/IEC 20000-1:2018 Information technology — Service management).
  2. Set document/record controls appropriate to your environment:
    • Unique ID per service
    • Version history or change log
    • Access control (who can edit/approve)
    • Backup/retention consistent with your SMS documentation controls

Practical note: spreadsheets can pass early maturity audits, but only if you show access control, change history, and a repeatable update process. Many teams fail on “control,” not on “existence.”

Step 3: Standardize the minimum data fields (make audits easy)

Define required fields per service. Keep it lean, but audit-ready:

Field Why auditors care
Service name + ID Prevents duplicates and naming drift
Service owner (accountable) Proves control and governance
Description + customers/users Shows it is a real service, not a component
Lifecycle status (planned/live/retired) Demonstrates management over time
SMS scope mapping Proves completeness vs scope statement
Support model (hours, escalation) Links to incident/request processes
Dependencies (key systems and third parties) Supports continuity and supplier management
Key commitments (SLA/OLA references) Ties to service level management
Last review date + reviewer Evidence of maintenance and improvement

Step 4: Reconcile completeness against reality (the step most teams skip)

Build the initial portfolio by reconciling multiple sources:

  • ITSM service catalog and request catalog items
  • CMDB/business applications list
  • Customer contracts/SOWs and current statements of work
  • Finance chargeback/showback lists and billing SKUs
  • Third-party contracts where a third party provides an ongoing service component
  • Monitoring/alerting service maps (what is actually being operated)

Document your reconciliation method. Auditors often ask, “How do you know you captured all in-scope services?” Clause 8.2.1 expects a controlled portfolio that includes all scoped services, not a best-effort list (ISO/IEC 20000-1:2018 Information technology — Service management).

Step 5: Put the portfolio under change control

Treat service entries like controlled records:

  1. Create a workflow for add/change/retire service entries.
  2. Define approval gates (at minimum: service owner approval; optionally service management approval).
  3. Integrate with change management so major service changes trigger portfolio updates. If a service’s support hours, dependencies, or customer commitments change, the portfolio must reflect it.

Step 6: Make “continual improvement” real and provable

Continual improvement for the portfolio does not need to be complex. You need evidence that you improve accuracy and usefulness over time (ISO/IEC 20000-1:2018 Information technology — Service management). Examples:

  • Reduce duplicate services by consolidating naming and ownership.
  • Add missing dependency and third-party mapping for higher-risk services.
  • Improve lifecycle hygiene by formally retiring services and closing obligations.

A simple improvement log tied to portfolio quality issues is enough if you can show it is maintained.

Required evidence and artifacts to retain

Keep artifacts that prove existence, completeness, and control:

  • Service portfolio extract (current) with service entries and required fields (ISO/IEC 20000-1:2018 Information technology — Service management).
  • Scope-to-portfolio mapping showing how each scoped area is represented in the portfolio.
  • Procedure/work instruction for creating, updating, reviewing, and retiring services in the portfolio.
  • Change history (audit trail, pull requests, ticket history, versioned file history).
  • Periodic review records (meeting notes, review sign-offs, exception lists).
  • Reconciliation evidence (initial build notes, source lists, gap remediation tickets).
  • Improvement log tied to portfolio quality, with owners and outcomes.

Common exam/audit questions and hangups

Auditors tend to probe the same fault lines:

  1. “Show me the service portfolio.” They expect a single authoritative set of documented information (ISO/IEC 20000-1:2018 Information technology — Service management).
  2. “How do you know it includes all in-scope services?” Bring your reconciliation approach and scope mapping.
  3. “Who approves changes?” Be ready with workflow evidence and sample updates.
  4. “How do you keep it current?” Show review records and triggers tied to change management.
  5. “What’s the difference between your catalog and your portfolio?” Be explicit: catalog is customer-facing subset; portfolio is full in-scope set.

Frequent implementation mistakes and how to avoid them

  • Mistake: confusing a product list with a service portfolio. Fix: enforce a service definition and required fields that reflect operation (owner, support model, commitments).
  • Mistake: portfolio exists, but nobody owns it. Fix: assign a portfolio owner plus per-service accountable owners; make updates part of their operational duties.
  • Mistake: no lifecycle hygiene. Fix: define retirement criteria and require closure of open obligations (data retention, contract terms, access).
  • Mistake: portfolio maintained outside change processes. Fix: link portfolio updates to change management and service onboarding/offboarding.
  • Mistake: uncontrolled spreadsheet sprawl. Fix: one system of record, access controls, and an audit trail.

Enforcement context and risk implications

No public enforcement cases were provided for this ISO clause. Practically, the risk is operational and audit-driven: an incomplete or uncontrolled portfolio causes gaps in incident coverage, unclear ownership, missed third-party dependencies, and inconsistent service commitments. In ISO 20000 certification audits, those gaps often surface as failures to demonstrate control and maintenance of documented information required by Clause 8.2.1 (ISO/IEC 20000-1:2018 Information technology — Service management).

Practical execution plan (30/60/90)

You asked for speed. Here is a plan that works even with limited resources.

First 30 days: establish the backbone

  • Confirm SMS scope boundaries and publish a one-page service definition.
  • Select the system of record and lock down access and change logging.
  • Define minimum required fields and create the service entry template.
  • Draft the add/change/retire workflow and assign roles (portfolio owner, service owners).

Next 60 days: build and reconcile

  • Populate the initial service portfolio from ITSM/CMDB/contract sources.
  • Run reconciliation workshops with service owners to eliminate duplicates and fill missing fields.
  • Produce a scope-to-portfolio coverage map and open remediation tickets for gaps.
  • Start capturing change history through the defined workflow.

Next 90 days: prove control and continual improvement

  • Run the first formal portfolio review and record outcomes (updates, retirements, exceptions).
  • Implement triggers from change management and service onboarding to portfolio updates.
  • Start an improvement log focused on data quality (missing owners, outdated support models, unclear dependencies).
  • Prepare an audit packet: portfolio export, procedure, sample change records, review evidence.

Where Daydream fits: if you manage many services and third parties, Daydream can act as the controlled workspace for service records, ownership, and evidence collection, so audits don’t turn into screenshot scavenger hunts. Keep the portfolio as the “front page” for service governance, with linked artifacts and an audit trail.

Frequently Asked Questions

Is a service catalog enough to meet the service portfolio requirement?

Usually no. A catalog is typically customer-facing and omits internal or retired services that still create obligations. Clause 8.2.1 expects a portfolio that includes all services within SMS scope and is controlled as documented information (ISO/IEC 20000-1:2018 Information technology — Service management).

Can we keep the service portfolio in a spreadsheet?

Yes, if you can show it is controlled documented information with access control, version history or change log, and a defined update process (ISO/IEC 20000-1:2018 Information technology — Service management). In practice, spreadsheets often fail once multiple teams edit copies.

How detailed do service entries need to be?

Enough to demonstrate governance and operational control: owner, lifecycle status, customers/users, and references to commitments and support model. If the entry can’t answer “who runs this, who depends on it, and what are we committing to,” it’s thin for audit purposes.

Do we need to include third-party services in our portfolio?

Include services you provide within SMS scope, even if a third party delivers parts of them. Record key third-party dependencies so you can manage continuity, incident response, and service level commitments tied to that service.

What counts as “continually improve” for the service portfolio?

Evidence that you identify portfolio quality issues and fix them over time, such as adding missing owners, correcting lifecycle status, improving dependency mapping, or retiring obsolete services. Maintain a simple improvement log linked to actions and outcomes (ISO/IEC 20000-1:2018 Information technology — Service management).

How do we prove the portfolio includes all in-scope services?

Show your reconciliation method and results: which authoritative sources you checked (ITSM, CMDB, contracts, finance lists), what gaps you found, and how you resolved them. Auditors want traceability from scope statement to portfolio entries (ISO/IEC 20000-1:2018 Information technology — Service management).

Frequently Asked Questions

Is a service catalog enough to meet the service portfolio requirement?

Usually no. A catalog is typically customer-facing and omits internal or retired services that still create obligations. Clause 8.2.1 expects a portfolio that includes all services within SMS scope and is controlled as documented information (ISO/IEC 20000-1:2018 Information technology — Service management).

Can we keep the service portfolio in a spreadsheet?

Yes, if you can show it is controlled documented information with access control, version history or change log, and a defined update process (ISO/IEC 20000-1:2018 Information technology — Service management). In practice, spreadsheets often fail once multiple teams edit copies.

How detailed do service entries need to be?

Enough to demonstrate governance and operational control: owner, lifecycle status, customers/users, and references to commitments and support model. If the entry can’t answer “who runs this, who depends on it, and what are we committing to,” it’s thin for audit purposes.

Do we need to include third-party services in our portfolio?

Include services you provide within SMS scope, even if a third party delivers parts of them. Record key third-party dependencies so you can manage continuity, incident response, and service level commitments tied to that service.

What counts as “continually improve” for the service portfolio?

Evidence that you identify portfolio quality issues and fix them over time, such as adding missing owners, correcting lifecycle status, improving dependency mapping, or retiring obsolete services. Maintain a simple improvement log linked to actions and outcomes (ISO/IEC 20000-1:2018 Information technology — Service management).

How do we prove the portfolio includes all in-scope services?

Show your reconciliation method and results: which authoritative sources you checked (ITSM, CMDB, contracts, finance lists), what gaps you found, and how you resolved them. Auditors want traceability from scope statement to portfolio entries (ISO/IEC 20000-1:2018 Information technology — Service management).

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
ISO/IEC 20000-1 Service portfolio: Implementation Guide | Daydream