Inventory every Modbus endpoint: IP/serial, firmware, function-code permissions.
☐
Disable unused serial ports; set slave addresses ≠ 1 if possible.
☐
Remove port 502 exposure on corporate firewall; require VPN.
☐
Begin baseline capture: 7 days of “normal” traffic for future anomaly detection.
☐
Train operators: recognise exception storms, slow drifts, and field physical tamper clues.
Chapter recap
Classic Modbus offers no encryption, authentication, or anti-replay, making it trivial to snoop, spoof, or sabotage.
Attack vectors span from cable taps to SYN floods to subtle MitM value drifts.
Real incidents prove consequences range from downtime to safety hazards.
Detection relies on baselining and traffic inspection; full defence demands segmentation, filtering, and cryptographic wrappers (next chapters).
Assets to create
ID
Visual / file
Fig-21-1
Attacker persona wheel
Fig-21-2
Purdue model attack-surface diagram
Fig-21-3
Incident timeline
Table 21-A
Likelihood-impact heat map
Sample pcap
Broadcast write attack
Next:Chapter 22 – Best Practices for Securing Modbus Implementations will build a defence-in-depth playbook: segmentation, firewalls, VPNs, deep-packet inspection, and SOC monitoring that turn today’s vulnerabilities into manageable, auditable residual risks.
— Architecture, Sockets & the MBAP Header (Module 3 · Modbus TCP/IP — Modbus over Modern Networks) Mission for this chapter: Show you every byte, flag, and network nuance that…
— Taking Industrial Protocol Security to the Next Level (Module 7 · Security & Hardening – Protecting Industrial Systems) Learning objectives After finishing this chapter you will be able to…
— Enduring Relevance, Evolution Pathways & Long-Term Outlook (Module 8 · Real-World Applications & the Future of Modbus) Why this chapter exists We have marched from first principles (Chapter 1)…