This document provides guidance on securing existing ColdFusion applications with large codebases. It recommends beginning the process by deleting unused code and implementing version control. It then advises patching the ColdFusion server, locking down server permissions, and implementing a web application firewall. The document outlines prioritizing the fixing of high risk vulnerabilities like file uploads, dynamic evaluation, SQL injection, and file system access. It provides code examples and tips for finding and fixing issues related to evaluate, IIF, file uploads, path traversals, and SQL injection. Finally, it mentions additional areas to review like session handling, scope injection, authentication, and cross-site scripting.