Mcra December 2023
Mcra December 2023
Mcra December 2023
Microsoft Cybersecurity
Reference Architectures
(MCRA)
1. Strategic
Strategic Framework
Framework 2. Strategic initiatives
End to End Strategy, Architecture, Clearly defined architecture and
Business Scenarios and Operating Model implementation plans
Guiding North Star
CISO Workshop
Security Program and Strategy Security Hygiene: Backup and Patching
1 - I want people to do their job
End-to-end Security Program Guidance + Integration with Digital & Cloud Transformation Teams
4 - Security
I want to proactively meetDesign Session Infrastructure and Development
Module 4 – Infrastructure & Development Security
Architecture
regulatory requirements
Module 1 – Zero Trust Architecture and
Module 5 – Data Security & Governance, Risk, Compliance (GRC)
Ransomware
5 - I want to have confidence in my
Data Security & Governance, Risk, Compliance (GRC)
security posture and programs
OT and
Module IoT
6 – IoT andSecurity
OT Security
Security Adoption Framework
Reduce risk by rapidly modernizing security capabilities and practices
CEO
Securing Digital
Transformation Engaging Business
Business Leadership Leaders on Security
Business and
Security
Integration Security Strategy and Program
CIO CISO
Includes
Reference Plans
Security Adoption Framework
Reference Plans
CEO
Securing Digital
Transformation
Security
Integration
CIO CISO
Security Strategy,
Technical Leadership Program, and
Epics / Initiatives
Architecture and
Policy
Architects & Technical Managers
Technical Planning
Implementation
Implementation and Operation
Documentation
Step by Step Instructions on
Microsoft Docs site
Common Security Antipatterns - Technical Architecture
Common mistakes that impede security effectiveness and increase organizational risk
Low
Must secure across everything Nothing gets retired! ‘Data swamp’ accumulates
Brand New - IoT, DevOps, and Cloud services, devices and products Usually for fear of breaking managed data + unmanaged ‘dark’ data
Current/Aging - 5-25 year old enterprise IT servers, products, etc. something (& getting blamed)
Legacy/Ancient - 30+ year old Operational Technology (OT) systems
Data
Attackers have a lot of options
People Application
Forcing security into a holistic
complex approach Infrastructure
DECIDE
ACT
Journey
Security Operations
Development / DevSecOps
Device Types
Patch Microsoft 365 E5 Role Mapping
Modernization
Securing Digital
Transformation Engaging Business
Leaders on Security
Business and
Security
Integration Security Strategy and Program
Security Strategy,
Programs, and
Epics Zero Trust Architecture
Implementation
and Operation
Includes
Reference Plans
Where do you want to Start?
There’s no wrong place to start
Topic Full
Summary workshop
Zero Trust Architecture 4 hours
End to End Strategy 2-3 days
MCRA
and Planning
Product Adoption
2-3 days
5
End to End Strategy and Planning
Use Case Title and Description Topic Full
Summary Workshop
Getting Overview and Scoping (Start here if you don't know where to start) 4 hours ‐
Started This short conversation is like a 'trail head’ to help you pick the best path to get started (from the below)
with security modernization planning based on your current needs and priorities.
Product The Security Capability Adoption Planning helps you maximize value from your current product licenses ‐ 2 days
Adoption and entitlements by providing an overview of these Microsoft product capabilities. This includes a
prioritization and planning exercise to rapidly get the most security benefit out of the capabilities you have
access to (often including Microsoft 365 E5 and Microsoft Unified)
End to End Microsoft Cybersecurity Reference Architectures provide guidance on end to end technical architectures 4 hours 2 Days
Technical including a summary of Microsoft security capabilities, integration, and more. Based on aka.ms/MCRA. (MCRA) (Security
Architecture The Security Architecture Design Session (ADS) Module 1 guides you through additional architectural ADS 1)
context including guiding principles, a 'Rosetta Stone' of security models, cross‐discipline integrated
scenarios, shared responsibility models, technical plans, and more.
Strategy and The CISO workshop enables senior security and technology leaders (CISOs, CIOs, directors, and others) to 4 hours Custom
Program accelerate security strategy and program modernization with best practices and lessons learned. The scope
workshop covers all aspects of a comprehensive security program including recommended strategic
initiatives, roles and responsibilities guidance, reference success metrics, maturity models, Zero Trust
principles, and more. Based on aka.ms/CISOWorkshop
Plan and Execute Initiatives
Use Case Title and Description Topic Full
Summary Workshop
Access Security ADS Module 2 ‐ Secure Identities and Access provides guidance for planning and architecting access 4 hours TBD when
Control control to secure access to a 'hybrid of everything' modern enterprise, mitigate attacks on privileged available
(Identity, accounts, and integrate identity and network access strategies together.
The full workshop (currently in development) provides additional detail on a policy‐driven adaptive access
Network, and control (integrating identity, network, and other access controls) including includes maturity models, success
more) criteria, recommended technical architectures, a Microsoft case study, and a planning exercise to map out
your journey by tailoring reference plans to your unique needs.
Security Security ADS Module 3 ‐ Modern Security Operations (SecOps/SOC) provides guidance for modernizing 4 hours 2‐3 days
Operations SecOps strategy, processes, architecture, and technology to address the simultaneous challenges of rapidly
(SecOps/SOC) evolving threat actors, covering a 'hybrid of everything' technical estate, aligning SecOps to business goals,
mitigating analyst fatigue/burnout, and more.
The full workshop provides additional detail on attacks and incident response, recommended processes and
metrics, putting an XDR + SIEM + Security Data Lake Strategy into action, Microsoft case study, advanced
functions (threat hunting, detection engineering, incident management, threat intelligence), outsourcing
considerations, and a planning exercise to map out your journey.
Infrastructure Security ADS Module 4 ‐ Infrastructure & Development Security provides guidance for planning and 4 hours TBD when
& architecting infrastructure and development security for multi cloud environments, including how to address available
Development the simultaneous challenges of rapidly evolving infrastructure, securing workloads and applications as you
develop them, and building a teamwork‐oriented DevSecOps approach for keeping up with rapidly evolving
/ DevSecOps threats, technology, and business requirements.
Security The full workshop (currently in development) provides additional detail on models, methodologies, and
technologies to modernize infrastructure & development security.
Security Resources
Security Adoption Framework Security Documentation
aka.ms/saf aka.ms/SecurityDocs
• CISO Workshop – aka.ms/CISOworkshop | -videos • Driving Business Outcomes Using Zero Trust
Security Strategy and Program • Cloud Adoption Framework (CAF) – aka.ms/cafsecure ▪ Rapidly modernize your security posture for Zero Trust
▪ Secure remote and hybrid work with Zero Trust
▪ Identify and protect sensitive business data with Zero Trust
• Microsoft Cybersecurity Reference Architectures (MCRA) - aka.ms/MCRA | -videos ▪ Meet regulatory and compliance requirements with Zero Trust
Zero Trust • Ransomware and Extortion Mitigation - aka.ms/humanoperated
Architecture • Backup and restore plan to protect against ransomware - aka.ms/backup • Zero Trust Deployment Guidance - aka.ms/ztguide | aka.ms/ztramp
Secure Identities and Modern Security Infrastructure & Data Security & IoT and OT Security
Access Operations (SecOps/SOC) Development Security Governance
• Securing Privileged Access (SPA) • Incident Response - aka.ms/IR • Microsoft Cloud Security • Secure data with Zero Trust • Ninja Training
Guidance • CDOC Case Study - aka.ms/ITSOC Benchmark (MCSB) • Ninja Training • Defender for IoT Training
aka.ms/SPA • Ninja Training aka.ms/benchmarkdocs • Microsoft Purview Information Protection • MCRA Videos
aka.ms/MIPNinja • MCRA Video OT & IIoT Security
• Access Control Discipline • Microsoft 365 Defender • Well Architected Framework (WAF)
aka.ms/m365dninja aka.ms/wafsecure
• Microsoft Purview Data Loss Prevention • Defender for IoT Documentation
• Ninja Training aka.ms/DLPNinja
• Microsoft Defender for Office 365 aka.ms/D4IoTDocs
• Microsoft Defender for Identity • Azure Security Top 10 • Insider Risk Management
aka.ms/mdoninja
aka.ms/mdininja aka.ms/azuresecuritytop10 • Microsoft Purview Documentation
• Microsoft Defender for Endpoint
• MCRA Video aka.ms/mdeninja • Ninja Training aka.ms/purviewdocs
• Zero Trust User Access • Microsoft Cloud App Security • Defender for Cloud
• Microsoft Entra Documentation aka.ms/mcasninja
• Microsoft Sentinel • MCRA Video
aka.ms/entradocs
• Infrastructure Security
• MCRA Videos
• Security Operations • Defender for Cloud Documentation
• SecOps Integration
Product Capabilities • Security Product Documentation Microsoft Security Response Center (MSRC)
www.microsoft.com/security/business Azure | Microsoft 365 www.microsoft.com/en-us/msrc
Key Industry References and Resources
Verify Explicitly
Protect assets against attacker control by explicitly validating that all trust and security
decisions use all relevant available information and telemetry.
Secure Identities Infrastructure & IoT and OT Modern Security Data Security &
and Access Development Security Security Operations (SecOps/SOC) Governance
Zero Trust Principles
Business Enablement
Align security to the organization’s mission, priorities, risks, and processes
Assume Breach (Assume Compromise)
Assume attackers can and will successfully attack anything (identity, network, device, app, infrastructure, etc.) and plan accordingly
Transforms from “defend the network” to “enable secure productivity on any network”
Assume
Assume breach
Compromise
General strategy shift from
| Explicitly Verify
Verify Explicitly
Reduce attack surface
| Least privileged
Least Privileged
Reduce blast radius both
Security Disciplines ‘assume safe network’ and exposure to risk proactive and reactively
Just-in-time & Just-enough-access (JIT/JEA)
Access Control Adaptive Access
Risk-based polices Always make security decisions using all available data points, including Secure Access Cloud Infrastructure Entitlement
identity, location, device health, resource, data classification, and anomalies. Service Edge (SASE) Management (CIEM)
Micro-segmentation
Threat modelling
Innovation Security DevSecOps and CI/CD process integration
of best practices (Static and dynamic analysis, etc.)
US National Institute of
Standards and
The Open Group Technology (NIST)
Focused on integration Focused on architecture
with business and and implementation with
IT/Enterprise/Security available technology
architecture
Many organizations are contributing valuable perspectives and guidance like the Cybersecurity and
Infrastructure Security Agency (CISA), Cloud Security Alliance (CSA), and some technology vendors
Key Zero Trust Models and Architectures
Asset-Centric Protection
(Data-Centric & System-Centric)
Digital Ecosystems
Data/Information
Adaptive
Access Control
• Centralized policy control Apps & Systems
• Distributed enforcement
Digital Identity
Decentralized portable identities Security Security Zones
Zones
Asset-Centric Security Operations – rapid and complete detection, response, and recovery from attacks
Posture Management – continuous improvement of attack prevention measures
Zero Trust Governance – continuous monitoring and audit on demand to meet risk and compliance
Zero Trust Components
Digital Ecosystems
Data/Information
Distributed Policy
Enforcement Points (PEPs) Apps & Systems
Security Zones
Microsoft Security Capability Mapping
The Open Group Zero Trust Components
Microsoft Entra ID
ID Protection
Workload ID Governance Microsoft
Visibility and Policy Purview
Entra ID Governance
Access Control Asset Protection
Defender for Identity
Classification, Protection, Tokenization
Identity and Network - Multi-factor Authentication
Digital Ecosystems
Data/Information
Microsoft Entra
Conditional Access Microsoft Purview
Microsoft Priva
Entra Internet Access
Entra Private Access
Distributed Policy
Apps & Systems Innovation
Enforcement Points (PEPs)
Defender for Cloud
Security
Defender for
Azure Arc
APIs (preview)
Intune
Device Management 65+ Trillion signals per GitHub Advanced Security
day of security context & Azure DevOps Security
Security Zones
Defender for Endpoint Secure development and
software supply chain
Endpoint Detection and Microsoft Entra
Response (EDR) Conditional Access
Asset-Centric Azure Firewall (Illumio partnership)
Security Operations
Security telemetry from across the environment
Microsoft Sentinel
Microsoft Defender • Security Information and Event
Management (SIEM)
Data Security
NIST Area
Security Analytics
NIST Sub-Area Microsoft Sentinel
• Sub-Area
Microsoft Defender XDR • Security Information and Event
Management (SIEM)
Security Orchestration, Automation, and
Microsoft Service
•
Defender for Endpoint Defender for Office 365 Defender for Identity Defender for Cloud Apps Defender for Cloud Response (SOAR)
Identities
Strong
Human authentication
Non-human
Apps
Zero Trust Policies Network
Request Adaptive SaaS
enhancement Public Access
Evaluation
On-premises
Traffic filtering Private
Enforcement
& segmentation
(as available)
Endpoints Infrastructure
Device Risk
compliance assessment Serverless
Corporate
Runtime Containers
Personal
control
IaaS
Threat Protection Paas
Threat Intelligence
Forensics
Response Automation
Telemetry/analytics/assessment
architecture
Governance
Compliance
Data
Classify,
Security Posture Assessment Emails & documents
label,
Productivity Optimization encrypt Structured data
Threat Intelligence
Defender for Endpoint Defender for Cloud
Endpoint Detection and Forensics Azure Arc
Microsoft Sentinel
Telemetry/analytics/assessment
Microsoft Defender • Security Information and Event
Management (SIEM)
JIT & Version Control • Security Orchestration, Automation,
Defender for Endpoint Defender for Office 365 Defender for Identity Defender for Cloud Apps Defender for Cloud and Response (SOAR)
Managing Information/Cyber Risk February 2023 -
Security responsibilities or “jobs to be done” https://aka.ms/SecurityRoles
Incident
Response
Incident
Management
Threat
Hunting
Microsoft security capability mapping
Which roles typically use which capabilities
https://aka.ms/MCRA
Identity Admin, Identity Architect, Incident preparation Security architecture Infrastructure and endpoint security,
Microsoft Entra
Microsoft Purview
Network Security relational databases Data security • Azure Sphere
• Microsoft Defender for Azure
• Azure Firewall Cosmos DB • Microsoft Purview
• Azure Firewall Manager • Microsoft Security Copilot (preview) • Information Protection
•
•
Azure DDoS
Azure Web Application Firewall
• Microsoft Sentinel • Data Loss Prevention
• Microsoft 365 Defender
Innovation Security
• Microsoft Security Experts
• Azure Networking Design • Microsoft Incident Response • Microsoft Defender for Cloud Apps Integrate Security into DevSecOps
• Virtual Network, NSG, ASG, VPN, etc. Detection and Response Team (DART) processes. Align security, development,
• PrivateLink / Private EndPoint People security and operations practices.
• Attack Simulator
Endpoint / Device Admin • Insider Risk Management Application security and DevSecOps
Threat intelligence Analyst
• Microsoft Intune • (Same as Infrastructure Roles)
• Configuration Management • Microsoft Defender Threat Privacy Manager • GitHub Advanced Security
• Microsoft Defender for Endpoint Intelligence (Defender TI) • Microsoft Priva • Azure DevOps Security
• Microsoft Sentinel
Microsoft Security Experts
Microsoft Entra
Discover
Monitor Classify
Protect
Azure Backup
Security & Other Services
aka.ms/SPA
Secure Score Compliance Score CSPM: Defender for Cloud Microsoft Defender External Attack Surface Management (EASM) Vulnerability Management
Changes
SIEM, SOAR,
Microsoft Security Copilot (Preview) and UEBA
Microsoft Entra
Discover
Monitor Classify
Protect
Azure Backup
Security & Other Services
aka.ms/SPA
Secure Score Compliance Score CSPM: Defender for Cloud Microsoft Defender External Attack Surface Management (EASM) Vulnerability Management
Microsoft Entra
Discover
Monitor Classify
Protect
Azure Backup
Security & Other Services
aka.ms/SPA
Secure Score Compliance Score CSPM: Defender for Cloud Microsoft Defender External Attack Surface Management (EASM) Vulnerability Management
6
https://aka.ms/MCRA
6
Azure Arc
Organizational policy
Conditional
Access
Security context
Behavior analytics Threat intelligence User and session risk Device risk
Employee
Partner
https://aka.ms/MCRA
Business Critical Assets
Intermediaries
Intermediaries
Enterprise Assets – Multiple generations of technology spanning clouds, Devices, Operating Systems, Applications, Data Formats, and more
https://aka.ms/MCRA
https://aka.ms/MCRA
Analysts
and Hunters
©Microsoft Corporation
Azure
Zero Trust Principles - Assume breach, verify explicitly, Use least privilege access (identity and network)
End to End IT, OT, and IoT Device Security
Most Industries
Physical Industries
Monitor and Control Physical Process Enable Human Process Consumer IoT
OT/ICS Industrial IoT General-purpose IoT Network Devices Business IoT IT Endpoints
Industrial automation, Sensors, meters Cameras, VoIP phones, badge Routers, switches, ATMs, Point of Servers, laptops,
PLCs, Building detectors, and readers, printers, smart TVs, access points Sale, voting, tablets, mobile
Management Systems purpose-built smart appliances, smart meters,
(HVAC, smoke alarms, medical, kiosks,
elevators, etc.) connected cars
Micro Agent
(for greenfield)
Azure Resources/Data
<add name(s)> Update processes, tooling, and Scope: Update all user devices (corporate issued, BYOD, mobile, PC, Mac, etc.) while
User Device Patching skills for all components including giving users limited control over reboot scheduling.
Productivity / End
to apply updated organizational policy supply chain:
User Team(s) Key Tooling: Intune, SCCM (Dynamic Updates | WaaS) , WSUS, 3rd party tools
• Change – adopt to a ‘patch by
<add name(s)> default’ approach to rapidly Scope: Active Directory Domain Controllers, Exchange Servers, and DNS Servers
Domain Controllers and DNS Patching
Identity/Networking/ update assets while enabling (high network exposure, high impact, and high resiliency/redundancy built in)
to apply updated organizational policy asset owners limited control of Key Tooling: WSUS / SCCM, Azure VM Patching, 3rd party tools
Server Infra Teams
timing for testing and reboots
• Build – Automate deployment Scope: All server operating systems instances (VMs, physical servers, hypervisors, etc.)
Server Infrastructure Patching <add name(s)>
(CI/CD, IaC, etc.) and include Key Tooling: Azure VM Patching, Azure Update Management Center (Preview)
to apply updated organizational policy Server Infra Teams
security updates and RPM, APT-GET, Chef, Ansible, Puppet, Windows Update, WSUS, SCCM, 3rd party tools)
configuration
• Restore – Build and test ability Scope: Container orchestration, images, and image repositories
Container Patching <add name(s)>
to rapidly recover systems after Key Tooling: Standard server patching for orchestration/infrastructure, container creation
to apply updated organizational policy Server Infra Teams and repository management tools for containers, Defender for Containers
an attack
• Retire – Ensure all asset types
Application Patching <add name(s)> Scope: All apps, middleware, and supply chain components for all formats and platforms
support exception process and
to apply updated organizational policy Multiple Teams replace/isolate un-securable
Key Tooling: Standard user device and server tooling, additional 3rd party tooling
assets Scope: Firmware & embedded OS/applications for user devices, servers, printers,
Firmware and Device Patching <add name(s)>
Continuously improve until routers/Switches, IoT devices, OT Devices, others with work data / network connectivity
to apply updated organizational policy Multiple Teams reaching ideal state Key Tooling: WSUS (Surface devices and other OEMs), 3rd party tools
Idea Incubation First Production Release Production DevSecOps
Defender for Defender for IoT (& OT) Microsoft Entra Defender for
Office 365 ID Protection Cloud Apps
IoT Device Disrupt OT
Phishing Open Exploitation Environment Exfiltration
Brute force account Attacker
mail attachment accesses of data
or use stolen account
credentials sensitive data
Defender for Endpoint
Attacker collects Domain
Click a URL
Exploitation Command Defender for reconnaissance & compromised
and Installation and Control User account is
Identity compromised configuration data
Browse
a website Microsoft Defender Attacker attempts
for Cloud lateral movement
Privileged account
compromised
Disgruntled or disenchanted
Potential
Insider has access Anomalous
sabotage
Subject to stressors to sensitive data activity detected
Static
Defend across attack chains Slide
https://aka.ms/MCRA
Defender for Defender for IoT (& OT) Microsoft Entra Defender for
Office 365 ID Protection Cloud Apps
IoT Device Disrupt OT
Phishing Open Exploitation Environment Exfiltration
Brute force account Attacker
mail attachment accesses of data
or use stolen account
credentials sensitive data
Defender for Endpoint
Attacker collects Domain
Click a URL
Exploitation Command Defender for reconnaissance & compromised
and Installation and Control User account is
Identity compromised configuration data
Browse
a website Microsoft Defender Attacker attempts
for Cloud lateral movement
Privileged account
compromised
Disgruntled or disenchanted
Potential
Insider has access Anomalous
sabotage
Subject to stressors to sensitive data activity detected
It’s bad out there! Attacker techniques,
business models, and
For sale in “bad neighborhoods” on the internet skills/technology, are
continuously evolving
MITRE ATT&CK Framework Detailed model for technical detection coverage assessments and planning
Lockheed Martin Kill Chain Legacy Reference Model (missing lateral traversal)
Actions on the
Reconnaissance Weaponization Delivery Exploitation Installation Command and Control
Objective
Simple Name Product Capability Name Simple Name Product Capability Name
Microsoft Entra ID P2
Microsoft Defender for Endpoint Plan 1
Microsoft Defender for Endpoint (formerly Azure Active Directory Premium Plan 2)
Microsoft Defender for Endpoint Plan 2 User Provisioning
Entra ID (formerly Azure AD)
Microsoft Defender for Identity Advanced Security Reports
Microsoft Defender for Identity
Microsoft Advanced Threat Analytics • Multifactor Authentication Multifactor Authentication
• Microsoft Entra Conditional Access Conditional Access
Microsoft Defender for Office 365 Plan 2
• Microsoft Entra ID Protection Risk Based Conditional Access / Identity Protection
Microsoft Defender for Office Application Guard for Office 365 Self-service password change
• Self-service password management
Safe Documents Self-service password unlock/reset
Microsoft Defender for Cloud Apps Microsoft Defender for Cloud Apps Access Reviews
• Identity Governance
Entitlement Management
Microsoft Defender Antimalware Microsoft Defender Antimalware
• Privileged Identity Management Privileged Identity Management
Microsoft Defender Firewall Windows Hello for Business Windows Hello for Business
Microsoft Defender Exploit Guard Microsoft Defender for Identity
Microsoft Defender for Identity
Advanced Windows Security Microsoft Defender Credential Guard Microsoft Advanced Threat Analytics
Details at https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans
Product Families Enable Modernization Initiatives
Secure Identities Infrastructure & IoT and OT Modern Security Data Security &
and Access Development Security Security Operations (SecOps/SOC) Governance
Unmanaged Internet
Basic network monitoring for guests,
partners, new/unmanaged devices
Managed Internet
Monitored network for validated devices to communicate
peer to peer (patching, collaboration, etc.)
Unmanaged Internet
Basic network monitoring for guests,
partners, new/unmanaged devices
Managed Internet
Microsoft Entra
Monitored network for validated devices to communicate application proxy
peer to peer (patching, collaboration, etc.)
Unmanaged Internet
Basic network monitoring for guests,
Low Impact IoT/OT
partners, new/unmanaged devices Printers, VoIP phones, etc.
Managed Internet
Microsoft Entra
Monitored network for validated devices to communicate application proxy
peer to peer (patching, collaboration, etc.)
Managed Devices
Specialized Accounts Specialized Devices
Sensitive System users,
developers, & admins Adaptive
Enterprise Accounts Access Control Enterprise Devices
Employee Partner
T
O
/
T
o
I
t
c
a
p
m
I
w
o
L
Effective implementation requires completeness and consistency.
Align business processes, people readiness, and all technical controls
(network, identity, application, management tools, etc.)
Ability (and speed) to
accomplish advanced tasks
Native
Native Human
Computer Skills and learning required
to become productive
AI Usage
AI Application
Model
AI Platform Dependent
Establish clarity: Implement responsible Prioritize greatest needs and
Your data is your data AI principles opportunities for security
Your data is your data
Built with security, Your data is not used to train the foundation
AI models
privacy, and
compliance
Your data is protected by the most
comprehensive enterprise compliance and
security controls
Grounded in responsible AI principles
Transparency Governance
Security Copilot Incident Surface an ongoing incident, assess its scale, and
get instructions to begin remediation based on
Priority Scenarios response proven tactics from real-world security incidents.
Is AI that detects and classifies, can work on vast amounts of data, for
use in real-time applications and automation of capabilities.
• Traditional AI is good at: Looking at a large field of data and
finding patterns or continuations (like making recommendations).
• Traditional AI is bad at: Understanding highly complex smaller
things like language.
Generative AI (GAI)
Is AI that understands and creates content, such as GPT. It works on relatively
small chunks of data – text, images, sounds, videos – and has a “linguistic” Generative AI
understanding. Large language models (LLMs) are a kind of GAI and the term is
often used as a synonym, but LLMs are ones that work on text.
• GAI is good at: Understanding language, summarizing, translating concepts
(e.g. from language to code or vice-versa); roleplaying as characters
• GAI is bad at: Processing large amounts of data.
[Note: All AI’s are trained on large amounts of data; this is about what they
can do after they’re trained]
Generative AI Terminology.docx