You are a CCA conducting a CMMC Level 2 assessment for an OSC. During the assessment, you discover that the OSC has implemented a practice using a temporary workaround due to a recent system failure. The workaround meets the practice’s objectives, but it is not documented in their System Security Plan (SSP). How should you evaluate this evidence?
Submit