Inventory every Modbus endpoint: IP/serial, firmware, function-code permissions.
☐
Disable unused serial ports; set slave addresses ≠ 1 if possible.
☐
Remove port 502 exposure on corporate firewall; require VPN.
☐
Begin baseline capture: 7 days of “normal” traffic for future anomaly detection.
☐
Train operators: recognise exception storms, slow drifts, and field physical tamper clues.
Chapter recap
Classic Modbus offers no encryption, authentication, or anti-replay, making it trivial to snoop, spoof, or sabotage.
Attack vectors span from cable taps to SYN floods to subtle MitM value drifts.
Real incidents prove consequences range from downtime to safety hazards.
Detection relies on baselining and traffic inspection; full defence demands segmentation, filtering, and cryptographic wrappers (next chapters).
Assets to create
ID
Visual / file
Fig-21-1
Attacker persona wheel
Fig-21-2
Purdue model attack-surface diagram
Fig-21-3
Incident timeline
Table 21-A
Likelihood-impact heat map
Sample pcap
Broadcast write attack
Next:Chapter 22 – Best Practices for Securing Modbus Implementations will build a defence-in-depth playbook: segmentation, firewalls, VPNs, deep-packet inspection, and SOC monitoring that turn today’s vulnerabilities into manageable, auditable residual risks.
— Async, Bulk Data, Custom FCs & Protocol Conversion (Module 5 · Development & Implementation – Bringing Modbus to Life) Learning objectives Upon finishing this chapter you will be able…
— Sockets, NAT, & Real-World Network Nuances (Module 3 · Modbus TCP/IP — Modbus over Modern Networks) Chapter promise Everything you must know to run Modbus at Ethernet speed reliably, deterministically,…
— The Lingua Franca of Industrial Devices (Module 1: Foundations — Understanding the Modbus Universe) How to use this chapter Skim-friendly headings let you jump straight to the part you…