Service design and transition
ISO/IEC 20000-1:2018 Clause 8.5.2 requires you to run every new or changed service through a defined design-and-transition approach: plan it, design it, build it, test it, and deploy it, using a documented plan that covers scope, resources, schedule, and success criteria (ISO/IEC 20000-1:2018 Information technology — Service management). To operationalize it, standardize a single change-to-release workflow with entry/exit criteria and retain evidence at each stage.
Key takeaways:
- You need a repeatable lifecycle for new/changed services: plan → design → build → test → deploy (ISO/IEC 20000-1:2018 Information technology — Service management).
- Every transition must have a plan that explicitly states scope, resources, schedule, and success criteria (ISO/IEC 20000-1:2018 Information technology — Service management).
- Audits hinge on evidence: approvals, test results, deployment records, and proof that success criteria were met.
“Service design and transition” is where service management programs either become controllable or become a stack of ad hoc changes that only make sense to the people who shipped them. ISO/IEC 20000-1:2018 Clause 8.5.2 makes this concrete: you must be able to show, for each new or changed service, that your organization planned the work, designed the service, built it, tested it, and deployed it, and that your plan addressed scope, resources, schedule, and success criteria (ISO/IEC 20000-1:2018 Information technology — Service management).
For a Compliance Officer, CCO, or GRC lead, the fastest path is to translate this clause into (1) a single documented workflow that all teams follow, (2) clear gating criteria between stages, and (3) an evidence pack that can be produced quickly for any sampled service or change. This page gives requirement-level implementation guidance you can hand to service owners, engineering, IT operations, and release managers, then audit against without guessing what “good” looks like.
Regulatory text
Requirement (excerpt): “The organization shall plan, design, build, test and deploy new or changed services. Plans shall address scope, resources, schedule, and success criteria.” (ISO/IEC 20000-1:2018 Information technology — Service management)
What the operator must do:
You must define and run a controlled process that covers the full lifecycle for introducing or modifying services. For each new/changed service, you must also produce a plan that, at minimum, states:
- Scope: what is in and out, what systems/teams/customers are impacted
- Resources: people, tooling, environments, third parties (as applicable)
- Schedule: key dates/milestones appropriate to your delivery approach
- Success criteria: measurable acceptance criteria for readiness and post-deployment outcomes
All of the above must be repeatable and evidenced per transition (ISO/IEC 20000-1:2018 Information technology — Service management).
Plain-English interpretation
If you ship a new service, or change an existing one, you need to prove you did not “wing it.” You planned the work, designed what you intended to deliver, built it in a controlled way, tested it against defined expectations, and deployed it with approval and traceability. The plan is not optional paperwork; it is the control surface auditors use to judge whether the transition was managed (ISO/IEC 20000-1:2018 Information technology — Service management).
Who it applies to
Entities: Any organization or service provider operating a service management system aligned to ISO/IEC 20000-1 (ISO/IEC 20000-1:2018 Information technology — Service management).
Operational context where it shows up:
- IT operations introducing or modifying internal services (e.g., identity, endpoint management, network services)
- Product/engineering teams delivering customer-facing services
- Shared services (platform, data, SRE) rolling out changes that affect reliability or security posture
- Changes involving third parties (cloud providers, managed service providers, SaaS platforms) where your service depends on their components and delivery timelines
Important scoping note: This clause is about services, not only code releases. Changes to monitoring, capacity, routing, access patterns, runbooks, and support models can all be “changed services” if they alter how the service is delivered or supported.
What you actually need to do (step-by-step)
1) Define the standard “service transition plan” template
Create a mandatory template used for every new/changed service. Keep it short enough that teams complete it, but strict enough that it drives decisions.
Minimum fields to include (maps directly to the clause) (ISO/IEC 20000-1:2018 Information technology — Service management):
- Scope: service name, description, impacted users/customers, dependencies, excluded items
- Resources: accountable owner, delivery team, approvers, required environments, third-party inputs
- Schedule: milestones (design complete, build complete, test complete, deploy window)
- Success criteria: acceptance criteria for go-live, rollback criteria, initial operational targets (example: “all critical tests passed,” “monitoring and alerting enabled,” “support handoff completed”)
Practical tip: make “success criteria” binary where possible (pass/fail). Auditors struggle with vague statements like “deployment successful.”
2) Establish stage gates with entry/exit criteria
Document gates for: plan → design → build → test → deploy (ISO/IEC 20000-1:2018 Information technology — Service management). Your gates should answer: “What must be true before we proceed?”
Example gate controls (adapt to your environment):
- Plan gate: approved transition plan; identified service owner; initial risk/impact noted
- Design gate: architecture/design reviewed; operational support model drafted; monitoring approach defined
- Build gate: build artifacts versioned; configuration baselined; access controls defined for the service
- Test gate: test plan executed; defects triaged; evidence attached; readiness sign-off
- Deploy gate: change/release approval recorded; rollback plan ready; comms and support handoff completed
3) Map your existing SDLC/ITIL practices to the requirement, then close gaps
You may already have change management, release management, CI/CD, and SDLC controls. Your job is to prove they collectively satisfy the lifecycle and plan requirements in Clause 8.5.2 (ISO/IEC 20000-1:2018 Information technology — Service management).
Fast mapping approach:
- Identify your system of record (ticketing tool, release tool, project tool).
- For each lifecycle stage, list the artifact that proves it happened.
- Add missing mandatory fields to templates/workflows.
4) Make ownership and approvals explicit
Auditors will sample a changed service and ask who approved each stage. Define:
- Service owner accountable for success criteria and operational acceptance
- Release manager / change authority accountable for deployment authorization
- Operations/support accountable for acceptance of runbooks, monitoring, and handover
Approval does not need to be bureaucratic, but it must be traceable and consistent with your defined process (ISO/IEC 20000-1:2018 Information technology — Service management).
5) Operationalize testing as evidence, not intention
Clause language includes “test,” so you need proof of execution, not just a test plan (ISO/IEC 20000-1:2018 Information technology — Service management). For each transition, retain:
- What was tested
- Who ran it / when
- Results and defect disposition
- Any waivers and who approved them
6) Control the deployment and capture the “as deployed” state
Deployment should produce durable records:
- what version/config was deployed
- where it was deployed
- who approved it
- when it occurred
- whether success criteria were met after release (ISO/IEC 20000-1:2018 Information technology — Service management)
7) Build an “audit-ready transition pack” per service/change
Define a checklist so teams can self-assemble evidence. If you can’t produce it quickly, auditors will treat the control as not operating.
Where Daydream fits naturally: many teams struggle to gather a consistent transition evidence pack across tools (tickets, Git, CI, monitoring). Daydream can act as the control hub where the required plan fields, approvals, and attachments are standardized and exported as a single audit packet without chasing screenshots across systems.
Required evidence and artifacts to retain
Maintain artifacts per new/changed service (ISO/IEC 20000-1:2018 Information technology — Service management):
- Service transition plan (scope, resources, schedule, success criteria)
- Design artifacts (design doc, architecture decision record, dependency map)
- Build artifacts (version references, configuration baselines, infrastructure-as-code references where applicable)
- Test evidence (test plan, execution logs/results, defect list and closure/waivers)
- Deployment record (release notes, change record, approvals, deployment logs)
- Operational readiness (monitoring/alerting configuration, runbook, support handoff confirmation)
- Post-deploy validation against success criteria (sign-off, monitoring snapshots, incident-free validation notes if part of your success criteria)
Retention duration is not specified in the clause; set it in your service management system policy and apply consistently.
Common exam/audit questions and hangups
Expect auditors to ask for a sample of “new or changed services” and then drill into traceability (ISO/IEC 20000-1:2018 Information technology — Service management):
- Show the plan and where it states scope, resources, schedule, success criteria.
- Walk from plan → design → build → test → deploy with timestamps and approvals.
- Prove testing occurred and results were reviewed.
- Explain how you decide a service is ready to deploy (your gate criteria).
- Show how third-party dependencies were tracked when the service relies on external components.
- Demonstrate that success criteria were evaluated after deployment, not only defined upfront.
Hangup: teams often provide a project plan that lacks explicit success criteria. Another hangup: a CI pipeline exists, but there is no documented link from pipeline output to an approved deployment decision.
Frequent implementation mistakes and how to avoid them
-
Mistake: Treating “plan” as a project schedule only.
Fix: require scope, resources, and success criteria fields in the same record (ISO/IEC 20000-1:2018 Information technology — Service management). -
Mistake: Success criteria are vague (“stable,” “works as expected”).
Fix: define testable criteria (e.g., “all critical test cases pass,” “monitoring enabled,” “support team trained”). -
Mistake: Testing exists but evidence is not retained.
Fix: make test results an exit criterion for the test gate and block deploy without attachment links. -
Mistake: Changes through “emergency” paths bypass design/transition controls.
Fix: define an emergency workflow that still captures minimum plan elements and retrospective design/testing evidence after stabilization (ISO/IEC 20000-1:2018 Information technology — Service management). -
Mistake: Third-party inputs are unmanaged.
Fix: include third-party deliverables in resources and schedule, and require confirmation of readiness before deploy if the service depends on them.
Risk implications (why operators should care)
Weak service design and transition controls create predictable failure modes: broken deployments, unclear ownership, missing rollback options, and brittle services that operations cannot support. From a compliance perspective, the main risk is audit failure due to inability to show a consistent lifecycle and a plan containing the required elements (ISO/IEC 20000-1:2018 Information technology — Service management). From an operational perspective, the same gaps increase incident likelihood and prolong recovery because teams lack validated designs, test evidence, and deployment traceability.
A practical execution plan (30/60/90-day)
Exact timelines depend on organizational size and delivery model. Use phased execution and do not expand scope until evidence quality is stable.
First 30 days (Immediate: define and pilot)
- Publish the service transition plan template with mandatory fields tied to Clause 8.5.2 (ISO/IEC 20000-1:2018 Information technology — Service management).
- Define stage gates and minimal approval roles.
- Pilot the workflow on a small set of representative service changes (one customer-facing, one internal).
- Create the “transition pack” checklist and test whether you can assemble it without heroics.
By 60 days (Near-term: standardize and enforce)
- Embed templates and gates into your system of record (ticketing/release tooling).
- Train service owners and release/change authorities on what evidence is required and why.
- Add QA checks: no deploy approval unless the plan fields are complete and test evidence is attached.
- Start internal sampling: pick recent changes and verify traceability end-to-end.
By 90 days (Ongoing: scale and measure)
- Expand coverage to all services in scope of your service management system.
- Introduce periodic quality reviews of transition packs (spot checks by GRC or service management).
- Normalize exceptions: define emergency change expectations and retrospective evidence requirements.
- If evidence is scattered across tools, centralize collection and export (this is where Daydream can reduce audit prep load by standardizing plans and evidence packets).
Frequently Asked Questions
Does this requirement apply to small changes, like a minor configuration update?
If the change results in a “changed service” in practice, treat it as in scope and run it through your defined workflow (ISO/IEC 20000-1:2018 Information technology — Service management). Many teams set thresholds for low-risk changes, but still require a plan record and basic test/deploy evidence.
What counts as “success criteria” for ISO 20000 service design and transition?
Success criteria are the specific conditions you use to decide the new/changed service is ready and the transition succeeded (ISO/IEC 20000-1:2018 Information technology — Service management). Write criteria that you can verify with test results, sign-offs, or operational readiness checks.
Can our SDLC and CI/CD pipeline satisfy “build, test, deploy” without extra paperwork?
Yes, if you can show traceability from the approved plan through pipeline outputs and deployment authorization, and your plan includes scope, resources, schedule, and success criteria (ISO/IEC 20000-1:2018 Information technology — Service management). Auditors will still expect a single place that ties the evidence together.
How do we handle third-party dependencies during service transition?
Treat third-party deliverables as explicit resources and schedule inputs, and record readiness confirmation before deployment (ISO/IEC 20000-1:2018 Information technology — Service management). Keep evidence such as integration test results, third-party change notices, or approval notes in the transition pack.
What evidence is most commonly missing in audits?
Teams usually miss (1) explicit success criteria in the plan, and (2) test execution evidence tied to the specific service change (ISO/IEC 20000-1:2018 Information technology — Service management). Fix this by making both mandatory exit criteria before deployment approval.
Who should approve the transition plan and deployment?
The service owner should approve the plan content and success criteria, and the defined change/release authority should approve deployment per your process (ISO/IEC 20000-1:2018 Information technology — Service management). Keep approvals lightweight but consistent and recorded.
Frequently Asked Questions
Does this requirement apply to small changes, like a minor configuration update?
If the change results in a “changed service” in practice, treat it as in scope and run it through your defined workflow (ISO/IEC 20000-1:2018 Information technology — Service management). Many teams set thresholds for low-risk changes, but still require a plan record and basic test/deploy evidence.
What counts as “success criteria” for ISO 20000 service design and transition?
Success criteria are the specific conditions you use to decide the new/changed service is ready and the transition succeeded (ISO/IEC 20000-1:2018 Information technology — Service management). Write criteria that you can verify with test results, sign-offs, or operational readiness checks.
Can our SDLC and CI/CD pipeline satisfy “build, test, deploy” without extra paperwork?
Yes, if you can show traceability from the approved plan through pipeline outputs and deployment authorization, and your plan includes scope, resources, schedule, and success criteria (ISO/IEC 20000-1:2018 Information technology — Service management). Auditors will still expect a single place that ties the evidence together.
How do we handle third-party dependencies during service transition?
Treat third-party deliverables as explicit resources and schedule inputs, and record readiness confirmation before deployment (ISO/IEC 20000-1:2018 Information technology — Service management). Keep evidence such as integration test results, third-party change notices, or approval notes in the transition pack.
What evidence is most commonly missing in audits?
Teams usually miss (1) explicit success criteria in the plan, and (2) test execution evidence tied to the specific service change (ISO/IEC 20000-1:2018 Information technology — Service management). Fix this by making both mandatory exit criteria before deployment approval.
Who should approve the transition plan and deployment?
The service owner should approve the plan content and success criteria, and the defined change/release authority should approve deployment per your process (ISO/IEC 20000-1:2018 Information technology — Service management). Keep approvals lightweight but consistent and recorded.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream