Inventory every Modbus endpoint: IP/serial, firmware, function-code permissions.
☐
Disable unused serial ports; set slave addresses ≠ 1 if possible.
☐
Remove port 502 exposure on corporate firewall; require VPN.
☐
Begin baseline capture: 7 days of “normal” traffic for future anomaly detection.
☐
Train operators: recognise exception storms, slow drifts, and field physical tamper clues.
Chapter recap
Classic Modbus offers no encryption, authentication, or anti-replay, making it trivial to snoop, spoof, or sabotage.
Attack vectors span from cable taps to SYN floods to subtle MitM value drifts.
Real incidents prove consequences range from downtime to safety hazards.
Detection relies on baselining and traffic inspection; full defence demands segmentation, filtering, and cryptographic wrappers (next chapters).
Assets to create
ID
Visual / file
Fig-21-1
Attacker persona wheel
Fig-21-2
Purdue model attack-surface diagram
Fig-21-3
Incident timeline
Table 21-A
Likelihood-impact heat map
Sample pcap
Broadcast write attack
Next:Chapter 22 – Best Practices for Securing Modbus Implementations will build a defence-in-depth playbook: segmentation, firewalls, VPNs, deep-packet inspection, and SOC monitoring that turn today’s vulnerabilities into manageable, auditable residual risks.
— Six Field-Proven Case Studies across Industry (Module 8 · Real-World Applications & the Future of Modbus) Chapter goals See the protocol outside textbooks. We examine six production deployments—each in…
— Async, Bulk Data, Custom FCs & Protocol Conversion (Module 5 · Development & Implementation – Bringing Modbus to Life) Learning objectives Upon finishing this chapter you will be able…
— Serial Monitors, Wireshark & Protocol Analyzers (Module 6 · Troubleshooting & Diagnostics – Mastering Modbus Problem Solving) Learning objectives Select and configure the ideal tool—software or hardware—for any RTU- or TCP-based…