This document outlines the basic steps for securing a new operating system installation on hardware. It emphasizes the importance of securing the base operating system to control user access to shared resources, while also highlighting the need for adequate security at all system layers. The summary does not provide detailed steps but indicates that securing the operating system is a multi-layered process.