Cybersecurity for the Industrial Raspberry Pi: How Revolution Pi Is Continuously Hardened

Cybersecurity: A Must-Have in Industrial IoT and Automation
Revolution Pi – the Industrial Raspberry Pi for IIoT and automation – is deployed in connected infrastructures worldwide, from energy management and utility systems to manufacturing plants.
A successful cyberattack can cause outages, compromise process data, and lead to compliance violations.
Regulatory requirements are increasing as well:
- Since August 2025, the Delegated Act of the European Radio Equipment Directive (RED) has set cybersecurity requirements for radio equipment.
- From December 2027, the Cyber Resilience Act will require manufacturers of connected products to demonstrate security measures across the entire product lifecycle.
Cybersecurity is therefore essential for manufacturers and operators of industrial IoT systems.

Continuous External Testing with dissecto
At KUNBUS, cybersecurity is an integral part of product development. For the security validation of Revolution Pi, KUNBUS collaborates with dissecto – a specialist in cybersecurity for embedded systems and IoT hardware, and part of dSPACE since the end of 2025.
“We test Revolution Pi with penetration tests, security scans, and security reviews,” explains Dr. Nils Weiss, Senior Manager at dissecto. “In doing so, we simulate real-world attack scenarios on all hardware and software components.”
HydraVision: Automated Security Testing for Revolution Pi
The central tool for this is HydraVision, dissecto's platform for automated security testing. HydraVision tests Revolution Pi on three levels:
- Level 1: Interfaces and Low-Level Drivers
- Level 2: Protocols
- Level 3: System Defensibility – Evaluation of Security Controls and Functions

Pre-Image Release Testing: The Process
Security testing is an integral part of the Revolution Pi release cycle: Before each new image release, Revolution Pi undergoes a complete review, and any identified risks are addressed before publication.
Regression testing ensures that security updates do not affect existing functionality.

Continuous Vulnerability Monitoring (CVE)
In parallel, KUNBUS continuously checks the Revolution Pi OS and its included applications for known and emerging vulnerabilities (Common Vulnerabilities and Exposures – CVEs). For this, we rely on grype, an established open-source tool for analyzing known vulnerabilities in software packages.
This ensures that vulnerabilities are detected and fixed immediately – even between image releases. Revolution Pi users learn about security updates and image releases via the RevPi Update Tracker.
Conclusion: Cybersecurity With Revolution Pi – What This Means for Users
Revolution Pi, the industrial Raspberry Pi, is continuously tested by external experts according to high cybersecurity standards.
You benefit from:
- hardened hardware and software
- regular security updates
- a verifiable basis for your compliance documentation.
Our products comply with the RED DA. We are implementing the CRA requirements systematically and with high priority by December 2027.

RevPi Update Tracker
Information on Security Updates & New Images
Protect your systems: Subscribe to the RevPi Update Tracker and receive information on the latest security updates and image releases!