Information technology system (ITS), informally, is a set of workstations, servers, laptops, installed software, databases, LANs, firewalls, etc. Nowadays, every company has an ITS, but rarely is information about it available outside the company that owns it. However, there are many situations where the availability of such data would be beneficial. For example, cyber ranges emulate IT systems and need their description, and various algorithms in cybersecurity, in particular attack tree generation, need to be validated on models of IT systems. In this paper, we describe a system we call the Generator, that as inputs takes requirements such as the number of employees and the vertical to which the company belongs, and outputs a model of an ITS that satisfies the given requirements. A very important property, that we have put special emphasis on, is that the generated ITS models a large amount of details, and ideally resembles a real system. To the best of our knowledge, we are the first to have attempted to build something like this. We made a proof-of-concept implementation of the Generator, validated it by generating an ITS model for a simplified fictional financial institution, and analyzed its performance with respect to the problem size. The conducted experiments show that our approach is feasible. In the future, we intend to extend this prototype to allow probabilistic generation of IT systems when only a subset of parameters is explicitly defined, and further validate our approach with the help of domain experts.INDEX TERMS cybersecurity, cyber range, information technology system I. INTRODUCTION