The document outlines steps for securing a company's IT infrastructure, including creating a network and system administration policy, mapping the IT architecture, and testing each IT element. It recommends describing all IT elements in detail, securing each one through methods like hardening systems and services, updating software, and implementing monitoring, logging, backups and disaster recovery. The document provides links to additional pages on creating an administration policy and a security methodology.