Information security management

ISO/IEC 20000-1:2018 Clause 8.7.3 requires you to define, document, implement, and periodically review information security controls that manage confidentiality, integrity, and availability (CIA) risks for the information and systems used to deliver your services. To operationalize it, build a service-scoped control set, tie each control to risks and owners, and retain evidence that proves controls run as designed. 1

Key takeaways:

  • Scope security controls to “information and information systems used to deliver services,” not the entire enterprise by default.
  • Auditors will look for a closed loop: risk identification → defined controls → implementation → review and improvement.
  • Evidence must show operation (logs, tickets, access reviews), not just policy text.

“Information security management” in ISO/IEC 20000-1 is not a generic security program requirement. Clause 8.7.3 is narrowly framed around protecting the information and systems that enable service delivery, and it demands a full lifecycle: define controls, document them, implement them, then review them to confirm they still manage CIA risks. 1

For a Compliance Officer, CCO, or GRC lead, the fastest path is to treat this as a service management requirement with security outcomes. Start by clarifying which services are in scope (your ISO 20000 service management system scope), then enumerate the information assets and supporting systems that materially affect service delivery. From there, pick controls that address the relevant risks (access, change, vulnerability, backup, monitoring, supplier access, etc.), assign operational ownership, and set a review cadence that produces decisions and tracked actions.

If you already run ISO 27001 or a similar security framework, you can reuse many controls. The gap is usually traceability to service delivery, and evidence that reviews happen and cause change. This page gives a requirement-level blueprint you can implement quickly and defend in an audit.

Regulatory text

Requirement (verbatim): “The organization shall define, document, implement and review controls to manage risks to the confidentiality, integrity, and availability of information and information systems used to deliver services.” 1

What the operator must do

You must be able to show, for the systems and information that support your services:

  1. Defined controls exist (you chose specific safeguards).
  2. Documented controls exist (written, accessible, versioned descriptions: what, who, how, when).
  3. Implemented controls exist (controls are deployed in the environment and embedded in processes).
  4. Reviewed controls occur (you periodically assess effectiveness and update controls as risks or services change).
    All four verbs matter. A policy without implementation fails. Technical controls without documented ownership and review fail. 1

Plain-English interpretation

This requirement asks: “Do you have a repeatable, auditable security control system for the things that make your services work?”

  • Confidentiality: prevent unauthorized access or disclosure of service-related data and systems.
  • Integrity: prevent unauthorized or accidental modification that could corrupt services or records.
  • Availability: prevent outages or degradation that would stop services from being delivered as committed.

The phrase “used to deliver services” is the scoping anchor. If you can’t explain how a system supports a service, it’s hard to justify why it’s in scope for 8.7.3.

Who it applies to

Entity scope

  • Service providers and organizations operating an ISO/IEC 20000-1 service management system. 1

Operational context (what auditors will treat as in scope)

  • Production infrastructure supporting in-scope services (compute, network, identity, endpoints, platforms).
  • Service applications, integrations, APIs, and data stores.
  • Operational tooling that can affect service delivery (monitoring, CI/CD, ticketing, configuration management).
  • Third party services that host, process, transmit, or administer service data or service components (cloud, managed service providers, SaaS).

What you actually need to do (step-by-step)

Step 1: Lock the service scope and map “service-supporting” systems

Deliverable: a service/system dependency view that a non-technical auditor can follow.

  • List each in-scope service from your service catalog.
  • For each service, identify:
    • primary applications/components
    • data types and data flows
    • infrastructure dependencies (hosting, identity, network)
    • operational dependencies (monitoring, backups, CI/CD)
    • third parties with access or processing roles

Practical test: if a component fails, does the service fail or materially degrade? If yes, treat it as in scope for CIA risk controls.

Step 2: Identify CIA risks for those systems and information

Deliverable: a service-scoped risk register (or equivalent) that explicitly addresses confidentiality, integrity, and availability.

  • Capture threats and failure modes that are realistic for your environment:
    • unauthorized access (privilege misuse, weak authentication, orphan accounts)
    • unauthorized change (uncontrolled releases, config drift)
    • data loss/corruption (failed backups, bad migrations)
    • outages (capacity saturation, dependency failures, DDoS exposure)
    • third party compromise or misconfiguration
  • Record risk owners (usually service owners + security + platform owners).

You do not need perfect quantification. You do need clear linkage from risks to controls.

Step 3: Define the control set (what you will do to manage the risks)

Deliverable: an “Information Security Controls for Service Delivery” control matrix. For each control, document:

  • control objective (which CIA risk it addresses)
  • scope (services/systems)
  • control type (prevent/detect/correct)
  • owner and operator
  • procedure (how it runs)
  • frequency or triggering events (example: “on joiner/mover/leaver,” “on release,” “on incident”)
  • evidence produced

Control categories that typically map cleanly to 8.7.3:

  • Identity and access management (provisioning, MFA, privileged access, periodic access reviews)
  • Change management (approvals, segregation of duties where needed, rollback, emergency change process)
  • Vulnerability and patch management (scanning, remediation workflow, exceptions handling)
  • Logging and monitoring (security logging, alert triage, retention aligned to needs)
  • Backup and recovery (backup coverage, restore testing, recovery roles)
  • Configuration/security baselines (hardening standards, drift detection)
  • Incident management interface (security event intake, escalation paths)
  • Third party controls (access constraints, security requirements, monitoring of critical suppliers)

Keep it service-delivery focused. If you import a large enterprise control library, tag which controls actually apply to service delivery systems to avoid audit confusion.

Step 4: Implement controls in tools and processes

Deliverable: proof the controls are real.

  • Translate documentation into operational mechanisms:
    • IAM policies and groups, conditional access rules
    • pipeline checks and change gates
    • scanner deployments and remediation SLAs (as internal targets)
    • backup jobs and restore runbooks
    • alert rules, on-call procedures, ticket routing
  • Ensure responsibility is unambiguous:
    • Security may set standards.
    • Service teams run controls day-to-day.
    • GRC verifies and tracks exceptions.

If you use Daydream, map each service to its systems and third parties, attach the control matrix, and keep evidence in one place so “define/document/implement/review” is provable without a scramble.

Step 5: Review controls and track improvement

Deliverable: a recurring review record with decisions. The standard requires review; auditors will ask what changed as a result. 1

Minimum review outputs:

  • list of controls reviewed and scope confirmed
  • effectiveness issues found (missed alerts, failed restores, access review anomalies)
  • risk changes (new service features, new third party, architecture changes)
  • action items with owners and due dates
  • approved exceptions with rationale and expiry

Trigger extra reviews after major incidents, significant architecture changes, or onboarding a high-impact third party.

Required evidence and artifacts to retain

Use this as an audit-ready checklist.

Governance and design evidence

  • Information security control matrix scoped to service delivery systems
  • Service catalog and service scope statement (for the SMS)
  • Service/system dependency maps and data flow diagrams (high level is fine if accurate)
  • Service-scoped risk register with CIA risks and control linkages
  • Roles and responsibilities (RACI) for control ownership and operation

Operational evidence (the part most teams miss)

  • Access review records (who reviewed, what changed, when)
  • Joiner/mover/leaver tickets and privileged access approvals
  • Change records showing approvals, testing, emergency change handling
  • Vulnerability scan outputs and remediation tickets, including exceptions with approvals
  • Backup job status and restore test results
  • Monitoring alerts and incident tickets showing triage and resolution
  • Third party access logs/approvals and security requirements in contracts or addenda
  • Control review meeting minutes and action tracking

Common exam/audit questions and hangups

Expect these lines of questioning:

  1. “Show me your controls for CIA risks in service delivery.” They will not accept “we follow security best practices” without a documented control set.
  2. “How do you know the controls are working?” Bring operating evidence: tickets, logs, review outputs.
  3. “What changed after your last review?” Reviews that produce no actions look performative.
  4. “Which systems are in scope for this clause?” If you cannot explain scope boundaries, the auditor may expand scope.
  5. “How do third parties fit?” If a third party operates part of your service, you still need controls for the risks they introduce (contractual + technical + monitoring).

Frequent implementation mistakes (and how to avoid them)

Mistake Why it fails in audits How to fix fast
Writing a security policy and calling it “controls” Clause requires defined, implemented controls and review, not just intent 1 Build a control matrix with owners, procedures, and evidence outputs
Scoping to “the whole company” without clarity Creates an un-auditable commitment and lots of missing evidence Scope to service delivery systems, then expand deliberately
No linkage between risks and controls Auditor cannot see how controls manage CIA risks Add a “risk addressed” field per control, tied to the risk register
Reviews happen informally No proof of “review controls” Schedule reviews, record minutes/decisions, track actions to closure
Ignoring third party operational access Third party failures become your service failures Contractually require controls, restrict access, collect evidence, monitor critical dependencies

Enforcement context and risk implications

No public enforcement cases were provided for this ISO clause in the supplied source catalog. Practically, the risk is audit failure (certification impact) and increased likelihood that service-impacting security events become repeat incidents because controls are undocumented, inconsistently operated, or never reviewed. 1

A practical 30/60/90-day execution plan

(These are phases, not promises about elapsed time. Adjust to your environment and staffing.)

First 30 days (Immediate)

  • Confirm in-scope services and name service owners.
  • Produce a first-pass service/system dependency map for each in-scope service.
  • Stand up a service-scoped risk register focused on CIA.
  • Draft the control matrix with owners and evidence types.
  • Pick a single evidence repository structure (GRC tool or controlled foldering) and enforce naming/versioning.

Days 31–60 (Near-term)

  • Implement or formalize the highest-impact controls where evidence is currently weak:
    • access reviews for production and admin paths
    • change controls for service-impacting releases
    • backup/restore proof for critical data stores
    • vulnerability remediation workflow and exception handling
  • Start collecting evidence “as you go” through tickets and automated exports.
  • Define review triggers (major change, major incident, new critical third party).

Days 61–90 (Operationalize and prove review)

  • Run the first formal control review session:
    • confirm scope
    • test a sample of controls end-to-end
    • log findings and corrective actions
  • Close priority gaps and document compensating controls where needed.
  • Operationalize third party coverage for service-supporting providers:
    • document access pathways
    • confirm contractual security requirements
    • set an evidence request cadence for critical third parties (e.g., audit reports, attestations, or control statements)

If you need this to move fast across many services, Daydream can help you standardize the control matrix, map it to services and third parties, and keep operating evidence attached to the control record so reviews and audits are less manual.

Frequently Asked Questions

Do we need ISO 27001 to meet this ISO 20000 requirement?

No. Clause 8.7.3 requires defined, documented, implemented, and reviewed controls for CIA risks in service delivery, regardless of which security framework you use. If you have ISO 27001 controls, you can reuse them if you can show they cover the service delivery scope. 1

What’s the minimum documentation that passes an audit?

A control matrix tied to service delivery systems, a risk register that maps CIA risks to those controls, and evidence that controls operate plus are reviewed. Policies alone rarely satisfy the “implement and review” language. 1

How do we prove “availability” controls without uptime statistics?

Provide operational evidence: monitoring configuration, alert tickets, incident records, capacity/change records, and backup/restore tests for critical components. The goal is to show you actively manage availability risk for service delivery systems. 1

Are third parties explicitly in scope?

The clause covers “information and information systems used to deliver services,” which often includes third party-hosted systems or third party-operated components. Treat third party dependencies as in scope and document how you control access, requirements, and oversight. 1

How often do we need to review controls?

The standard requires that you review controls, but it does not set a fixed frequency in the provided text. Set a documented cadence and add event-based reviews after major changes or incidents, then retain the review records. 1

What’s the fastest way to reduce audit risk if we’re starting from scratch?

Start with scoping and evidence. Pick a small set of high-impact controls (access, change, vulnerability, backup, monitoring), document them in a control matrix, and collect operating evidence for a defined time window so you can prove implementation and review. 1

Footnotes

  1. ISO/IEC 20000-1:2018 Information technology — Service management

Frequently Asked Questions

Do we need ISO 27001 to meet this ISO 20000 requirement?

No. Clause 8.7.3 requires defined, documented, implemented, and reviewed controls for CIA risks in service delivery, regardless of which security framework you use. If you have ISO 27001 controls, you can reuse them if you can show they cover the service delivery scope. (Source: ISO/IEC 20000-1:2018 Information technology — Service management)

What’s the minimum documentation that passes an audit?

A control matrix tied to service delivery systems, a risk register that maps CIA risks to those controls, and evidence that controls operate plus are reviewed. Policies alone rarely satisfy the “implement and review” language. (Source: ISO/IEC 20000-1:2018 Information technology — Service management)

How do we prove “availability” controls without uptime statistics?

Provide operational evidence: monitoring configuration, alert tickets, incident records, capacity/change records, and backup/restore tests for critical components. The goal is to show you actively manage availability risk for service delivery systems. (Source: ISO/IEC 20000-1:2018 Information technology — Service management)

Are third parties explicitly in scope?

The clause covers “information and information systems used to deliver services,” which often includes third party-hosted systems or third party-operated components. Treat third party dependencies as in scope and document how you control access, requirements, and oversight. (Source: ISO/IEC 20000-1:2018 Information technology — Service management)

How often do we need to review controls?

The standard requires that you review controls, but it does not set a fixed frequency in the provided text. Set a documented cadence and add event-based reviews after major changes or incidents, then retain the review records. (Source: ISO/IEC 20000-1:2018 Information technology — Service management)

What’s the fastest way to reduce audit risk if we’re starting from scratch?

Start with scoping and evidence. Pick a small set of high-impact controls (access, change, vulnerability, backup, monitoring), document them in a control matrix, and collect operating evidence for a defined time window so you can prove implementation and review. (Source: ISO/IEC 20000-1:2018 Information technology — Service management)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
ISO/IEC 20000-1: Information security management | Daydream