Back to Resources
Field Note Jan 2026 7 min read

Modbus Over TCP Done Safely

Modbus TCP was designed for local networks and has no built-in authentication. Learn how to run it across segmented networks without compromise.

C

Cascadia OT Security

OT & ICS Security

VENDORINTEGRATORFACILITYOPERATORASSETRISK · HIGHRISK · HIGHRISK · HIGHRISK · MEDRISK · LOWSUPPLY CHAIN5 HANDOFFS

Modbus TCP is endemic in manufacturing—thousands of devices across industrial sectors run Modbus. The protocol has no inherent security: no authentication, no encryption, no message integrity checking. It assumes a trusted local network. Yet most modern OT networks are not local anymore. They are spread across multiple zones, connected through firewalls, and exposed to risks that were unimaginable when Modbus was designed.

The question is not how to replace Modbus TCP—that is not feasible in existing deployments. The question is how to run Modbus safely across untrusted network segments and how to detect when it is being abused. The answer combines firewall rules, authentication proxies, and monitoring.

Firewall Rule Design for Modbus

Modbus TCP runs on port 502 (or on non-standard ports if configured). Firewall rules should be explicitly narrow: allow traffic from specific source devices to specific destination devices on specific ports. Never allow any device to reach any other device on 502. Track which Modbus servers exist in your network and which clients legitimately access them, then write rules accordingly.

Distinguish between human access (engineering workstations querying servers) and device-to-device access (PLCs running Modbus commands). Human access can terminate through bastion hosts; device access should be direct where possible to minimize latency. Configure rules to reflect these patterns.

Authentication and Monitoring for Modbus

Protocol Upgrading Path

Modbus TCP remains deeply embedded in manufacturing because it is simple and widely supported. Newer protocols like OPC-UA provide authentication, encryption, and better semantics. If you are designing new systems or planning major upgrades, OPC-UA is more defensible long-term. But for existing Modbus deployments, focus on network-layer controls that compensate for lack of built-in security.

The goal is to make Modbus attacks difficult and detectable without requiring complete infrastructure replacement. If you'd like to discuss Modbus security for your facility, reach out.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call