Table of contents Overview Introduction to Understanding 🔎 PEOPLE: Deeper Understanding through Discussion and Discovery Stakeholder Experiences 🏃♀️ PROCESS: Performing Holistic Audits on ICT4D Introduction to Holistic Audits Our Iterative Process Security Considerations Security Audits Application Architecture Source Code Security Vulnerability Scanning Penetration Testing DevSecOps 🚀 TECHNOLOGY: Launching and Deploying New Tech in ICT4D Introduction to Launching Technology Beauty and Flaws of Architecture Source Code Concerns Development and Secure Operations Scanning and Testing 🧑🤝🧑 Threats and Risks for Civil Digital Identity Outreach and Awareness Guides Identity and Privacy