Review the following at least daily:• All security events• Logs of all system components that store, process, or transmit CHD and/or SAD• Logs of all critical system components• Logs of all servers and system components that perform security functions