All network components (switches, hubs, routers, etc.) should be in a location that is accessible only to authorized individuals with appropriate keys or access privileges.
A malicious user with access to such network components may be able to capture all the information (including usernames and passwords) passed through the device, or circumvent network level access restrictions.
Ensure that such network components are in a location that is accessible only to authorized individuals (e.g., technical staff in the department or designated ITServices employees) with appropriate keys or access privileges. Do not leave any equipment unattended in an open office area or in an office when you are not there. Wherever possible, network components should be located in designated communications closets or rooms.