Control of parties involved in the service lifecycle
ISO/IEC 20000-1 Clause 8.2.3 requires you to identify every third party involved in designing, building, transitioning, delivering, or improving your services, then put enforceable controls in place so each party meets the applicable ISO 20000-1 requirements. Operationalize it by mapping lifecycle parties to service activities, assigning requirement ownership, and enforcing controls through contracts, onboarding, and ongoing assurance.
Key takeaways:
- Build a single inventory of all third parties across the full service lifecycle, not just “IT vendors.”
- Translate “applicable requirements” into third-party obligations, then enforce them through contracts, access controls, and governance.
- Keep audit-ready evidence: lifecycle maps, third-party register, contract clauses, assurance results, and performance reviews.
“Control of parties involved in the service lifecycle” is a supply-chain control for service management. ISO/IEC 20000-1 expects you to know exactly who participates in your services end-to-end (design through improvement) and to prove you have controls that make those parties comply with the parts of the standard that apply to their work.
This requirement trips organizations that treat third-party management as a procurement-only function or only assess “critical vendors.” ISO 20000-1’s service lifecycle scope is wider: contractors, cloud providers, SaaS tools, outsourcers, implementation partners, and even shared internal groups can all affect service outcomes. The practical goal is simple: no lifecycle activity should depend on an unmanaged third party, and no third party should operate without documented requirements, oversight, and evidence of performance.
This page gives requirement-level implementation guidance you can execute quickly: who must be in scope, how to define “applicable requirements,” what controls auditors expect, what artifacts to retain, and a pragmatic execution plan that fits a CCO, GRC lead, or service management owner.
Regulatory text
Requirement (verbatim): “The organization shall determine all parties involved in the design, development, transition, delivery, and improvement of services, and establish controls to ensure those parties fulfil the applicable requirements of this document.” 1
Operator interpretation (plain English)
You must do two things:
-
Determine all parties involved across the service lifecycle. “Parties” means any internal or external entity that performs work, provides components, hosts platforms, supports operations, or influences service changes and improvements.
-
Establish controls so those parties meet the ISO 20000-1 requirements that apply to the work they do. Controls must be more than “we trust them.” They should be enforceable and evidenced (contractual obligations, process gates, access controls, review cadences, performance metrics, audit rights, etc.). 1
Who it applies to (entity and operational context)
Applies to: Any organization operating an ISO/IEC 20000-1 service management system (SMS), including internal IT service providers and external managed service providers. 1
Operationally, this is triggered whenever:
- A third party designs service architecture, security patterns, or operating models.
- A third party builds/configures systems, integrations, workflows, or service tooling.
- A third party participates in transition (migration, cutover, release, data move, onboarding).
- A third party delivers operational capabilities (hosting, monitoring, service desk, field support, patching, backup, IAM, etc.).
- A third party supports improvement (problem management input, performance tuning, capacity analysis, major incident reviews, continuous improvement backlog).
1
In-scope third-party examples (common misses):
- Cloud/IaaS and managed platform providers
- SaaS used to deliver or support services (ticketing, monitoring, messaging)
- Contractors and staff augmentation with admin access
- Outsourced service desk / NOC / SOC providers
- System integrators involved in change/release and transition
- Hardware maintenance providers who perform break/fix on service components
1
What you actually need to do (step-by-step)
Step 1: Define the service lifecycle and anchor it to your service catalog
Create a simple lifecycle view aligned to your SMS:
- Design
- Development/build
- Transition (release, migration, onboarding)
- Delivery/operations
- Improvement
Then map each service in your service catalog to the lifecycle activities it uses. Auditors want to see that your scope is tied to actual services, not an abstract vendor list. 1
Artifact: Service lifecycle map per service (a table is fine).
Step 2: Build a “parties register” across the lifecycle
For each service and lifecycle stage, list every party that performs or influences work. Capture:
- Party name and type (third party, internal shared service, affiliate)
- Lifecycle stage(s) impacted
- What they do (specific deliverables/activities)
- Data/access touched (systems, environments)
- Critical dependencies (single points of failure, privileged access)
- Business owner and technical owner
This is the inventory that proves you “determined all parties involved.” 1
Tip: If procurement has a vendor master, start there, then expand it by walking the lifecycle with service owners and change managers. Most gaps appear in transition and improvement workstreams.
Step 3: Identify the “applicable requirements” per party
ISO 20000-1 language is specific: third parties must meet the requirements that apply to their role. Convert that into a practical matrix:
- Rows: ISO 20000-1 requirement areas relevant to your SMS (e.g., change control, incident handling, access control, documentation, measurement/reporting).
- Columns: Parties
- Cell: obligation + evidence you require
Keep it narrow and enforceable. For example:
- If a third party executes changes, they must follow your change enablement process (or an agreed equivalent) and provide change records.
- If a third party provides monitoring, they must meet event classification, escalation, and reporting requirements.
1
Artifact: Applicability matrix (party → obligation → evidence).
Step 4: Establish controls (contractual + operational)
Controls must work in practice. Use a layered approach:
A) Contract and sourcing controls
- Include service-specific obligations: process adherence, documentation standards, data handling, incident notification, change controls, subcontractor restrictions, audit/assurance rights.
- Require flow-down: subcontractors must meet the same obligations when they touch your services.
- Define service levels and reporting requirements that align to your SMS measures (not generic SLA boilerplate).
1
B) Onboarding and access controls
- Formal onboarding checklist: required policies acknowledged, training completed where needed, access approved, logging/monitoring enabled.
- Least privilege, time-bound access for contractors; verify removal at offboarding.
- Tooling integration: ticketing, change, CMDB, monitoring feeds must be connected where the party performs lifecycle work.
1
C) Process gates
- No transition to production without evidence from relevant parties (test results, rollback plans, operational handover).
- No release without third-party readiness confirmation when they operate components.
- Require participation in incident bridges and PIRs when their components are implicated.
1
D) Ongoing assurance
- Performance reviews: trend SLAs, incidents, changes, problem records, and improvements attributable to the party.
- Evidence sampling: pull tickets/changes monthly or per review cycle to verify process adherence.
- Periodic re-assessment when scope changes (new service, major release, new data types, new regions).
1
Where Daydream fits (practical): If you struggle to keep lifecycle-party mappings, obligations, and evidence in sync, Daydream can act as the system of record for third-party due diligence and continuous assurance, linking services to parties, controls, and collected artifacts so audits don’t become spreadsheet archaeology.
Step 5: Assign ownership and escalation paths
Auditors look for named accountability:
- Service owner: accountable for end-to-end service outcomes, including third parties.
- Third-party owner (business owner): accountable for contract performance and governance.
- Process owners (incident/change/problem): accountable for enforcing process gates across parties.
- GRC/CCO: accountable for oversight, auditability, and risk acceptance decisions.
1
Document escalation thresholds (qualitative is fine): repeated SLA misses, major incidents, audit evidence gaps, unauthorized subcontracting, or refusal to participate in reviews.
Required evidence and artifacts to retain
Keep evidence tied to each party and service, with versioning and dates:
- Service catalog and scope statement (what services are covered by the SMS)
- Parties register across lifecycle stages
- Applicability matrix (ISO requirements → party obligations → evidence)
- Contracts/SoWs with relevant clauses (including subcontractor flow-down and audit rights where appropriate)
- Onboarding/offboarding records (access approvals, training acknowledgements, deprovision evidence)
- Operational evidence samples
- Change records showing third-party participation and approvals
- Incident records showing escalation, response, and comms participation
- Transition/handover checklists and acceptance sign-offs
- Governance records
- QBR/MBR minutes, action logs, service review decks, issue registers
- Corrective actions and follow-up evidence
1
Common exam/audit questions and hangups
Auditors commonly probe these areas:
- “Show me you identified all parties involved.” Expect requests for lifecycle mapping and examples from recent transitions and incidents.
- “How do you decide what ‘applicable requirements’ are?” They want a defensible method, not ad hoc judgment.
- “How do you control subcontractors?” Many failures happen here: the prime contract is controlled, but downstream parties operate without visibility.
- “Prove the control operates.” Policies and contract clauses are not enough; provide ticket/change samples and governance outputs.
1
Frequent implementation mistakes (and how to avoid them)
- Only listing procurement vendors. Fix: start from services and lifecycle activities, then identify parties by walking actual workflows (change, incident, transition).
- Treating SaaS tools as “just software.” Fix: if a SaaS tool supports delivery (monitoring, ticketing, communications), it affects service management outcomes and needs controls.
- No “flow-down” language. Fix: add subcontractor disclosure/approval requirements and ensure obligations pass through to downstream parties.
- Controls exist only on paper. Fix: implement process gates and routinely sample operational records to prove adherence.
- Unowned third-party relationships. Fix: assign a business owner and service owner for every in-scope party and make governance attendance non-optional.
1
Enforcement context and risk implications
No public enforcement cases were provided for this requirement, but the risk is operational and audit-driven: unmanaged third parties introduce failure modes across incident response, change success rates, service availability, and continuity. In ISO 20000-1 audits, weak evidence of third-party control often shows up as nonconformities because auditors can directly trace service outcomes to third-party activities and ask for proof of control operation. 1
A practical 30/60/90-day execution plan
First 30 days (stabilize scope and visibility)
- Confirm which services are in the SMS scope and list lifecycle stages used per service.
- Build the initial parties register from procurement + service owner workshops.
- Identify “high-friction” parties: privileged access, operational delivery, transition ownership, subcontracting.
- Draft the applicability matrix template and complete it for the highest-impact parties.
- Start evidence collection for one or two services as a pilot (change + incident + transition artifacts).
1
Days 31–60 (put controls in writing and into process)
- Update SoWs / contract addenda for in-scope parties with the obligations you defined.
- Implement onboarding/offboarding checklists and require tool/process integration (ticketing/change).
- Establish governance cadence: service review agenda, metrics, action tracking, escalation.
- Run a tabletop audit: pick a recent major incident or transition and trace every party’s role and evidence. Close gaps.
1
Days 61–90 (prove operation and make it repeatable)
- Start recurring evidence sampling (changes, incidents, access reviews) and document results.
- Roll the applicability matrix across remaining services and parties.
- Formalize subcontractor oversight: disclosure, approval, and evidence requirements.
- Create a “third-party lifecycle control pack” per critical service for audit readiness (register + matrix + contracts + evidence samples + review minutes).
1
Frequently Asked Questions
Does this requirement only apply to outsourced IT providers?
No. It applies to any organization running an ISO/IEC 20000-1 service management system, including internal IT teams that depend on third parties for tooling, hosting, support, or transition work. 1
What counts as a “party” in the service lifecycle?
Any internal or external entity that participates in design, development, transition, delivery, or improvement for an in-scope service. If they can affect a change, an incident, or service performance, treat them as in scope. 1
How do I define “applicable requirements” without mapping the entire standard to every third party?
Use an applicability matrix that links the party’s lifecycle activities to the specific ISO 20000-1 obligations relevant to those activities, along with required evidence. Keep it role-based and auditable. 1
Do SaaS tools like ticketing or monitoring platforms need to be included?
If the tool is part of delivering or managing the service (tickets, monitoring, paging, change workflows), the provider is a party in the lifecycle and needs controls and assurance proportional to its role. 1
What evidence will an auditor ask for first?
Expect requests for the parties register, the applicability matrix, and proof the controls operate (contract clauses plus real operational records such as change tickets, incident records, and service review minutes). 1
How do we handle subcontractors we don’t contract with directly?
Control them through the prime third party: require disclosure, approval rights where appropriate, and flow-down obligations with evidence rights tied to your services. Document how you verify this in governance reviews. 1
Footnotes
Frequently Asked Questions
Does this requirement only apply to outsourced IT providers?
No. It applies to any organization running an ISO/IEC 20000-1 service management system, including internal IT teams that depend on third parties for tooling, hosting, support, or transition work. (Source: ISO/IEC 20000-1:2018 Information technology — Service management)
What counts as a “party” in the service lifecycle?
Any internal or external entity that participates in design, development, transition, delivery, or improvement for an in-scope service. If they can affect a change, an incident, or service performance, treat them as in scope. (Source: ISO/IEC 20000-1:2018 Information technology — Service management)
How do I define “applicable requirements” without mapping the entire standard to every third party?
Use an applicability matrix that links the party’s lifecycle activities to the specific ISO 20000-1 obligations relevant to those activities, along with required evidence. Keep it role-based and auditable. (Source: ISO/IEC 20000-1:2018 Information technology — Service management)
Do SaaS tools like ticketing or monitoring platforms need to be included?
If the tool is part of delivering or managing the service (tickets, monitoring, paging, change workflows), the provider is a party in the lifecycle and needs controls and assurance proportional to its role. (Source: ISO/IEC 20000-1:2018 Information technology — Service management)
What evidence will an auditor ask for first?
Expect requests for the parties register, the applicability matrix, and proof the controls operate (contract clauses plus real operational records such as change tickets, incident records, and service review minutes). (Source: ISO/IEC 20000-1:2018 Information technology — Service management)
How do we handle subcontractors we don’t contract with directly?
Control them through the prime third party: require disclosure, approval rights where appropriate, and flow-down obligations with evidence rights tied to your services. Document how you verify this in governance reviews. (Source: ISO/IEC 20000-1:2018 Information technology — Service management)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream