Capacity management

ISO/IEC 20000-1:2018 Clause 8.4.3 requires you to ensure your services have enough capacity to meet agreed requirements now and as demand changes, factoring in current usage, forecast demand, technology lifecycle, and service improvement plans (ISO/IEC 20000-1:2018 Information technology — Service management). Operationally, this means you must run a repeatable capacity planning process tied to SLAs, change management, and budgeting.

Key takeaways:

  • Tie capacity targets directly to “agreed service requirements” (SLAs/OLAs/SLOs) and prove it with monitoring and forecasts.
  • Maintain a living capacity plan that accounts for demand, lifecycle/refresh risk, and planned service improvements.
  • Keep auditor-ready evidence: trends, forecasts, decisions, approvals, and outcomes (incidents avoided or learned-from).

Capacity management is a control that prevents a long list of operational failures: missed SLAs, brownouts during peak demand, unstable releases, slow incident recovery, and emergency spend that bypasses governance. ISO/IEC 20000-1:2018 Clause 8.4.3 is explicit about scope: it is not enough to monitor today’s utilization. You have to show that you can meet agreed service requirements both currently and in the future, using a method that considers demand forecasting, technology lifecycle, and service improvement plans (ISO/IEC 20000-1:2018 Information technology — Service management).

For a Compliance Officer, CCO, or GRC lead, the fastest way to operationalize this requirement is to treat capacity as a measurable service commitment with documented decision points: what is “sufficient,” how you know, who approves risk acceptance, and how capacity constraints feed change, incident, and financial planning. This page gives requirement-level implementation guidance, the evidence an auditor will ask for, and a practical execution plan you can hand to service owners and infrastructure leaders.

Regulatory text

ISO/IEC 20000-1:2018 Clause 8.4.3: “The organization shall ensure sufficient capacity to meet the agreed service requirements, both currently and in the future, considering current use, forecasted demand, technology lifecycle, and service improvement plans.” (ISO/IEC 20000-1:2018 Information technology — Service management)

What the operator must do:
You must run capacity management as a governed process that:

  • Defines what “sufficient capacity” means for each service in terms of agreed requirements (SLAs/OLAs/SLOs).
  • Measures current consumption and performance trends.
  • Produces forward-looking demand forecasts.
  • Accounts for technology lifecycle (end-of-life, supportability, scalability limits, licensing constraints).
  • Incorporates capacity impact from service improvement plans (new features, migrations, reliability work, security changes).
  • Results in documented decisions (add capacity, optimize, throttle, re-architect, accept risk) and follow-through.

Plain-English interpretation (capacity management requirement)

If you promise a level of service, you must be able to prove you have a plan and ongoing practice to keep enough compute, storage, network, platform limits, and human-operational capability to meet that promise as usage changes. Auditors will look for a closed loop: monitor → forecast → plan → fund/execute → validate.

Who it applies to

Entity types: Service providers and organizations delivering IT services (ISO/IEC 20000-1:2018 Information technology — Service management).

Operational context where it matters most:

  • Customer-facing applications with explicit SLAs/SLOs.
  • Shared platforms (virtualization, Kubernetes, databases, identity, message queues) that can become systemic bottlenecks.
  • Third-party dependencies (cloud service limits, SaaS tier caps, telecom bandwidth, managed database IOPS ceilings). The requirement still sits with you because the customer’s agreed requirement is with your organization.
  • Environments undergoing change: migrations, major releases, data growth, onboarding new customers, acquisitions, or data retention changes.

What you actually need to do (step-by-step)

1) Set the scope: list “services that have agreed requirements”

  • Build or confirm a service catalog entry for each in-scope service.
  • Identify the governing performance commitments (SLA/OLA/SLO) and the business “peak periods” that matter. Output: Service-to-requirement mapping (service name → agreed requirement → owner).

2) Define capacity “guardrails” per service and per key component

Translate agreed requirements into measurable capacity indicators. Examples:

  • Compute: CPU saturation thresholds, queue depth, request concurrency.
  • Storage: growth rate, free space floor, backup window impact.
  • Database: connection limits, read/write latency, IOPS, replication lag.
  • Network: bandwidth, packet loss, egress limits.
  • Platform limits: API rate limits, managed service quotas, license entitlements. Output: Capacity KPI list and alert thresholds aligned to service requirements.

3) Establish measurement and trending

  • Confirm monitoring coverage for the KPIs.
  • Produce recurring trend views that show utilization and performance over time, with peak vs normal.
  • Link trends to incidents and changes (e.g., “latency increased after release X”). Output: Monitoring dashboards and recurring capacity reports.

4) Forecast demand and identify the planning horizon you will govern

The standard requires future capacity, but does not dictate a specific horizon. Pick one you can sustain and document it as your operating cadence.

  • Use known drivers: customer onboarding pipeline, product roadmap, batch jobs, retention policy changes, marketing events, seasonal peaks.
  • Include third-party constraints: cloud quotas, SaaS tier thresholds, contract renewal dates. Output: Demand forecast with assumptions and confidence notes.

5) Account for technology lifecycle

Capacity is not only “more servers.” Lifecycle constraints often create the real risk.

  • Identify end-of-support dates, hardware refresh needs, version limits, scaling ceilings, and license expirations.
  • Track components where scaling is risky (vertical scaling limits, single-writer databases, legacy appliances). Output: Lifecycle register integrated into capacity planning.

6) Incorporate service improvement plans and planned change

Clause 8.4.3 explicitly calls this out. Capacity planning must ingest the change pipeline.

  • Require a capacity impact assessment for material changes (new feature, new tenant model, encryption changes, logging increases).
  • Ensure the release plan includes required capacity actions (quota increases, node pools, indexing changes). Output: Change records with capacity impact fields and approvals.

7) Make and document decisions; manage exceptions

For each projected constraint, choose one:

  • Add capacity (scale out/up, quota increases, contract change).
  • Improve efficiency (caching, indexing, archiving, job scheduling).
  • Change the requirement (renegotiate SLA/SLO, define maintenance windows).
  • Accept risk (with explicit approval, rationale, and expiry/review). Output: Capacity plan decisions log with owners, dates, and follow-up actions.

8) Validate after execution

  • After scaling or optimization, confirm the KPI trend improved and the service still meets agreed requirements.
  • If a capacity incident occurred, capture lessons learned and feed them back into forecasts and thresholds. Output: Post-change validation evidence and problem records where relevant.

Tooling note (Daydream, where it fits): If you struggle to keep forecasts, lifecycle risks, and change impacts in one place, Daydream can act as the control system of record: mapping services to commitments, tracking capacity risks to owners, and preserving the evidence trail auditors request.

Required evidence and artifacts to retain

Auditors typically want objective evidence that the process exists, runs, and affects decisions. Retain:

  • Capacity management procedure/runbook (scope, cadence, roles, inputs/outputs).
  • Service-to-requirement mapping (what “agreed service requirements” are for each service).
  • Monitoring evidence: dashboards, alert configurations, samples of alerts/tickets.
  • Trend reports: recurring utilization/performance trends with commentary.
  • Forecast artifacts: forecast models/spreadsheets, assumptions, scenario notes.
  • Lifecycle register: EOL/EOS notices, upgrade plans, constraints and deadlines.
  • Capacity plan: planned actions, timelines, funding path, dependencies.
  • Decision/exception records: approvals for risk acceptance or requirement changes.
  • Change records: capacity impact assessments and post-change validation notes.
  • Incident/problem linkages: capacity-related incidents and corrective actions.

Common exam/audit questions and hangups

  • “Show me how the SLA for Service A maps to capacity targets and monitoring.”
  • “How do you forecast demand, and what inputs do you use?”
  • “Where do technology lifecycle constraints show up in your plan?”
  • “How do planned improvements/releases feed capacity planning?”
  • “Prove that capacity planning results in actions, not just dashboards.”
  • “How do you manage capacity for third-party services you depend on?”

Hangups auditors raise:

  • Capacity owned by infrastructure, while SLAs are owned by product, with no shared governance.
  • “Future capacity” handled informally in engineering heads, with no retained evidence.
  • Forecasts exist, but lifecycle (EOL) and roadmap change impacts are missing.

Frequent implementation mistakes and how to avoid them

  • Mistake: Treating utilization thresholds as the requirement.
    Fix: Start from agreed service requirements, then derive KPIs that predict SLA risk.
  • Mistake: Focusing only on compute and ignoring platform limits.
    Fix: Track quotas, rate limits, connection pools, and license constraints as first-class capacity items.
  • Mistake: No exception process.
    Fix: Create a simple risk acceptance workflow with an owner, rationale, and review trigger.
  • Mistake: Forecasts that ignore service improvement plans.
    Fix: Require capacity impact as a gate in change management for material releases.
  • Mistake: Evidence scattered across chats and tribal knowledge.
    Fix: Centralize artifacts (capacity plan, decisions, and recurring reports) and keep them versioned.

Enforcement context and risk implications

No public enforcement cases were provided for this requirement. The practical risk is still high: sustained capacity shortfalls commonly become availability incidents, missed customer commitments, and audit nonconformities because you cannot demonstrate “future” readiness or decision control required by the standard (ISO/IEC 20000-1:2018 Information technology — Service management).

A practical 30/60/90-day execution plan

Because no source-backed timing requirements were provided, treat this as an operational rollout sequence you can adapt.

First 30 days (Immediate stabilization)

  • Confirm in-scope services and their agreed requirements.
  • Pick a small set of capacity KPIs per service and confirm monitoring exists.
  • Stand up a single recurring capacity review meeting with named owners.
  • Start a capacity decisions log (actions, risks, approvals).

By 60 days (Repeatable planning loop)

  • Publish the capacity management procedure (cadence, inputs, artifacts).
  • Produce the first forecast package and document assumptions.
  • Create the lifecycle register for critical components and link to the capacity plan.
  • Add “capacity impact” checks to change management for material changes.

By 90 days (Audit-ready, closed-loop control)

  • Demonstrate at least one completed cycle: trend → forecast → decision → execution → validation.
  • Formalize exception handling for accepted capacity risk and SLA changes.
  • Ensure third-party capacity constraints (quotas/tier limits) are tracked with renewal and escalation paths.
  • Centralize evidence retention so an auditor can trace each service requirement to capacity controls.

Frequently Asked Questions

What counts as “agreed service requirements” for ISO 20000 capacity management?

Use the commitments you have agreed with customers or internal consumers, typically SLAs, OLAs, or SLOs. The capacity plan should show how those commitments translate into measurable capacity indicators (ISO/IEC 20000-1:2018 Information technology — Service management).

Do we need a formal capacity plan document, or are dashboards enough?

Dashboards show current use, but Clause 8.4.3 also requires future capacity planning, lifecycle considerations, and improvement plan impacts. A lightweight plan plus a decisions log is usually the difference between “monitoring exists” and “capacity management is controlled” (ISO/IEC 20000-1:2018 Information technology — Service management).

How do we handle capacity when a third party provides part of the service (cloud/SaaS)?

Track third-party limits (quotas, tier caps, contract terms) as capacity constraints you manage, because your organization still owns meeting the agreed service requirements. Keep evidence of quota management, renewal timelines, and escalation paths.

What if we cannot forecast demand accurately?

Document assumptions and update them on a set cadence. Auditors generally look for a rational method and an operating loop that improves forecasts over time, not perfect predictions (ISO/IEC 20000-1:2018 Information technology — Service management).

How do we connect capacity management to change management without blocking delivery?

Require a capacity impact assessment only for material changes and make it a structured checklist with clear “pass/mitigate/accept risk” outcomes. Store the assessment with the change record so the evidence chain is intact.

What evidence is most persuasive in an audit?

Traceability. Show one service: agreed requirements, KPIs and monitoring, trend and forecast, a decision to add/optimize capacity, implementation evidence, and post-change validation that the service remains within targets (ISO/IEC 20000-1:2018 Information technology — Service management).

Frequently Asked Questions

What counts as “agreed service requirements” for ISO 20000 capacity management?

Use the commitments you have agreed with customers or internal consumers, typically SLAs, OLAs, or SLOs. The capacity plan should show how those commitments translate into measurable capacity indicators (ISO/IEC 20000-1:2018 Information technology — Service management).

Do we need a formal capacity plan document, or are dashboards enough?

Dashboards show current use, but Clause 8.4.3 also requires future capacity planning, lifecycle considerations, and improvement plan impacts. A lightweight plan plus a decisions log is usually the difference between “monitoring exists” and “capacity management is controlled” (ISO/IEC 20000-1:2018 Information technology — Service management).

How do we handle capacity when a third party provides part of the service (cloud/SaaS)?

Track third-party limits (quotas, tier caps, contract terms) as capacity constraints you manage, because your organization still owns meeting the agreed service requirements. Keep evidence of quota management, renewal timelines, and escalation paths.

What if we cannot forecast demand accurately?

Document assumptions and update them on a set cadence. Auditors generally look for a rational method and an operating loop that improves forecasts over time, not perfect predictions (ISO/IEC 20000-1:2018 Information technology — Service management).

How do we connect capacity management to change management without blocking delivery?

Require a capacity impact assessment only for material changes and make it a structured checklist with clear “pass/mitigate/accept risk” outcomes. Store the assessment with the change record so the evidence chain is intact.

What evidence is most persuasive in an audit?

Traceability. Show one service: agreed requirements, KPIs and monitoring, trend and forecast, a decision to add/optimize capacity, implementation evidence, and post-change validation that the service remains within targets (ISO/IEC 20000-1:2018 Information technology — Service management).

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
ISO/IEC 20000-1 Capacity management: Implementation Guide | Daydream