The document outlines 10 steps to cyber security: 1. Apply security patches and maintain secure configurations on all systems through inventory and baseline builds. 2. Establish privileged access management and limit privileges while monitoring user activity and access to logs. 3. Protect networks from attacks through perimeter defense, filtering unauthorized access and malware, and security controls testing and monitoring.