Top 20 ICS Protocols and Their Security Risks (Modbus, DNP3, OPC UA…)
Industrial Control Systems (ICS) run the world’s power grids, water systems, factories and transport and they do it using a motley collection of communication protocols. Many of those protocols were designed decades ago for reliability and real-time operation, not for modern cybersecurity. Today, attackers are weaponizing protocol weaknesses, and defenders must understand p-rotocol-specific risks, real incidents, and practical mitigations.
This article is written for OT/ICS and IoT security pros, asset owners, and security-aware engineers. It explains the background, breaks down the top 20 ICS protocols, cites recent real-world incidents that underline the danger, and gives actionable controls you can implement today.
Why protocols matter in OT (short background)
Protocols are the language devices use to talk to each other. In OT environments that language determines what commands an attacker can send, what data they can read, and whether they can disrupt physical processes. Unlike IT, OT often tolerates legacy systems, long lifecycles, and constrained compute/latency needs – which means many protocols lack authentication, encryption, or robust access control. Recent ICS malware and research show attackers increasingly exploit protocol weaknesses to move laterally, manipulate process values, or wipe devices. For example, Dragos documented an ICS-targeting malware family that communicates via Modbus to alter device readings, emphasizing how protocol exposure leads to sabotage.
NIST’s ICS guidance and national-level best practice documents make clear that protocol-level visibility, segmentation, and signature-based detection are core defensive pillars – because understanding what’s on the wire is the most reliable way to spot misuse of these languages.
High-level trends to watch
- Legacy ≠ secure. Many installed devices still use plaintext or unauthenticated protocols exposed by remote access mistakes.
- Malware targeting protocols. Recent malware families (e.g., FrostyGoop) used Modbus in attacks, proving attackers prefer protocols they can manipulate.
- Exposed services at the edge. Misconfigured gateways, vendor remote access, and cloud bridges increase the attack surface.
- Rapid CVE growth in OT. OT vulnerability disclosure and research are accelerating – vendors and integrators must patch, but priority and patch windows differ widely across assets. Industry reporting shows a rising share of high-impact, network-exploitable OT vulnerabilities.
- Visibility becomes the differentiator. Leading OT security platforms map hundreds of protocols to provide asset and communication visibility – a prerequisite for detection and response.
How to read the protocol entries below
For each protocol: a short technical picture, the principal security risks, real-world notes (when relevant), and practical mitigations you can apply quickly.
1. Modbus (RTU / TCP)
What it is: One of the oldest and most widespread industrial protocols. Simple request/response model for registers/coils.
Risks: No built-in authentication or encryption; plaintext commands; trivial to spoof or replay. Publicly exposed Modbus/TCP services are regularly abused.
Real world: Attacks and malware (including FrostyGoop) have used Modbus to manipulate device values.
Mitigations: Segmentation, restrict Modbus to control VLANs, firewall port 502, network monitoring for anomalous register writes, allow-list masters, and use protocol-aware IDS signatures.
2. DNP3 (and Secure DNP3)
What it is: Widely used in electric utilities and water SCADA for telemetry and control. Secure DNP3 adds authentication options.
Risks: Legacy deployments often use cleartext DNP3 without Secure DNP3; replay and spoofing risks; weak time-sync/auth configurations.
Mitigations: Deploy Secure DNP3 where possible, enforce strict key management, monitor for unexpected function codes/unsolicited responses, and isolate SCADA master-to-RTU links.
3. OPC Classic / OPC DA
What it is: Older OPC stack (COM/DCOM based) used to expose process data to HMIs/SCADA.
Risks: DCOM complexity, poor authentication defaults, remote code and elevation issues historically; often replaced by OPC UA.
Mitigations: Migrate to OPC UA where possible, restrict DCOM RPC, apply vendor hardening guides, and isolate legacy OPC hosts.
4. OPC UA (Unified Architecture)
What it is: Modern OPC with built-in security (certificates, encryption, secure channels).
Risks: Secure by design but misconfiguration (security mode None, weak certificates, open endpoints) undermines protections. Implementation differences across vendors can create gaps.
Mitigations: Enforce SignOrEncrypt, manage application certificates via a PKI, disable anonymous endpoints, and restrict endpoint exposure.
5. IEC 61850
What it is: Power-sector protocol for substation automation (GOOSE, MMS, SV).
Risks: Time-sensitive messaging, multicast use can spread impacts quickly; many deployments lack secure configurations; mapping to Ethernet increases exposure.
Mitigations: Network segmentation, IGMP snooping for multicasts, secure gatewaying, and vendor patches for MMS/GOOSE vulnerabilities.
6. PROFINET / PROFIBUS
What it is: Siemens ecosystem protocols for factory automation (PROFIBUS serial, PROFINET Ethernet).
Risks: PROFINET often trusts devices on the link; PROFINET exposure + vulnerable PLC firmware has led to high-severity advisories (Siemens family vulnerabilities have been demonstrated).
Mitigations: Harden PLCs, network segmentation, use managed switches, monitor device-level anomalies, and maintain firmware hygiene.
7. EtherNet/IP (CIP)
What it is: Industrial Ethernet protocol used by Rockwell/ODVA families.
Risks: Many devices expose services for I/O and remote programming; lacking authentication in older versions; object-model lends itself to unauthorized writes.
Mitigations: Enforce CIP Security where supported, control programming ports, and monitor for unexpected configuration changes.
8. Siemens S7COMM
What it is: Siemens proprietary PLC communication stack.
Risks: Multiple past high-impact vulnerabilities (remote code execution and DoS) demonstrate how stack flaws can be devastating. Patch and configuration gaps are common.
Mitigations: Follow vendor advisories, patch where feasible, restrict port 102 access, and monitor traffic patterns.
9. BACnet / BACnet/IP
What it is: Building automation protocol for HVAC, access control, elevators.
Risks: Discovery and command messages often unauthenticated; devices exposed on building networks can be abused to manipulate environment controls.
Mitigations: Isolate building automation networks, filter broadcast traffic, require network access control, and use BACnet Secure Connect where available.
10. MQTT (and MQTT-S / MQTT over TLS)
What it is: Lightweight publish/subscribe messaging used in IIoT for telemetry.
Risks: Plaintext brokers, anonymous client connections, topic-spoofing, retained messages inadvertently leaking state.
Mitigations: Use TLS, authenticated clients, ACL-protected topics, broker rate-limits, and broker logging/monitoring.
11. AMQP
What it is: Enterprise messaging protocol used in IIoT back-ends.
Risks: Misconfigured brokers can allow unauthorized publish/subscribe or broker takeover.
Mitigations: Harden broker auth, network segmentation between OT and cloud, use TLS and client certs.
12. IEC 60870-5-104
What it is: Telecontrol protocol used in power and utility networks (TCP/IP variant).
Risks: Many implementations lack authentication, enabling spoofing or malicious control commands.
Mitigations: Deploy secure gateways, restrict ports, use deep-packet inspection for unexpected function codes.
13. ICCP / TASE.2
What it is: Intercontrol Center Communications Protocol – used to exchange data between control centers.
Risks: Misconfiguration and lack of strict access controls can expose inter-utility links to tampering.
Mitigations: Secure tunnels (IPsec), strict peer ACLs, and mutual authentication.
14. HART / HART IP
What it is: Field instrumentation protocol; HART IP moves instrumentation to Ethernet.
Risks: Field devices often resource-limited; old HART commands may be abused.
Mitigations: Gateway isolation, restrict commissioning interfaces, and monitor field device behavior.
15. CANbus / CANopen
What it is: Controller Area Network used in transport and embedded automation.
Risks: No authentication; bus eavesdropping and injection can control actuators. Automotive lessons apply to ICS devices using CAN.
Mitigations: Segregate CAN networks, use secure gateways, endpoint authentication where available.
16. EtherCAT
What it is: Real-time Ethernet for motion control.
Risks: Time-sensitive nature complicates adding heavy crypto; an injected frame can impact motion controllers.
Mitigations: Physical isolation, secure gateways, and careful network design to avoid exposure.
17. LonWorks
What it is: Building automation and legacy distributed control protocol.
Risks: Devices and network management tools often assume a trusted environment.
Mitigations: Replace where feasible, isolate and monitor, and enforce NAC.
18. SNMP (in OT)
What it is: Network management protocol used by networked OT devices and gateways.
Risks: v1/v2c expose cleartext community strings; insecure SNMP configurations reveal topology and allow changes.
Mitigations: Use SNMPv3, limit management access, and audit MIB reads/writes.
19. Modbus RTU (serial)
What it is: Serial variant of Modbus used on RS-485 links.
Risks: Fewer protocol‐level risks than TCP (no IP exposure) but physical access or poorly filtered gateways can bridge risks to IP.
Mitigations: Secure physical layer, avoid bridging serial to TCP without authentication, and inspect gateway configs.
20. CoAP / Lightweight IoT protocols (when used in IIoT)
What it is: RESTful, constrained application protocol used in resource-constrained devices.
Risks: Misuse of DTLS, unauthenticated endpoints, and proxy misconfigurations expose sensors/actuators.
Mitigations: Use DTLS/TLS, authenticate endpoints, and limit proxying across trust boundaries.
Common mitigations that apply across protocols
- Network segmentation & zero-trust principles: Isolate control networks, limit lateral movement, and only allow required ports/hosts. CISA and ICS-CERT guidance emphasize defense-in-depth – layering controls across network, host, and process levels.
- Protocol-aware monitoring: Inspect protocol semantics (not just ports) to detect abnormal writes, unexpected function codes, or timing anomalies. Vendor platforms that map hundreds of protocols greatly accelerate detection.
- Least privilege & application whitelisting: Limit which hosts can send control commands; treat engineering stations, HMIs and jump hosts as highly privileged.
- Strong authentication & crypto where supported: Enforce Secure DNP3, OPC UA Sign & Encrypt, MQTT over TLS, SNMPv3, etc. But don’t assume “support” means “deployed” – verify configurations.
- Vendor patching and firmware management: Prioritize patches that fix remote-exploitable protocol/stack flaws (e.g., certain Siemens S7 advisories). Risk-based patching and compensating controls for assets that can’t be updated are essential.
- Reduce external exposure: Block direct Internet access to OT services (Modbus, DNP3, IEC endpoints), tighten VPN/remote vendor access, and require jump servers with MFA and session logging.
- Inventory and baselining: Maintain a definitive inventory of protocols, ports and endpoints – this is the baseline for all detection and response activities. Many governments and security frameworks make this a first step.
Practical short checklist (for immediate action)
- Inventory which of the above protocols are present and where.
- Check whether any production protocol endpoint is reachable from the Internet – if yes, isolate immediately.
- Enable protocol-aware detection on gateways and NIDS; tune to catch register writes and unsolicited commands.
- Verify OPC UA endpoints use Sign & Encrypt and managed certificates.
- Replace or gateway legacy cleartext services (Modbus/DNP3) with secure proxies or restrict them to isolated segments.
- Harden engineering workstations and require jump hosts for remote access with MFA and logging.
Closing: a roadmap for programmatic resilience
Protecting ICS is not about eradicating every risk (legacy will remain); it’s about making exploitation costly, detectable, and recoverable. Start with visibility (what protocols are running and where), then harden the highest-risk protocols (those that allow control writes or are exposed externally), and finally bake detection and response into the operational playbook. Industry reporting shows increasing adversary focus on protocol exploitation and a growing catalog of OT vulnerabilities – so continuous monitoring, prioritized patching, and protocol-level controls are no longer optional.
