Modern intrusions are identity-driven, not endpoint-driven. Attackers exploit token replay, weak federation, cloud privilege escalation, OAuth manipulation, machine identity compromise, and SaaS-to-cloud lateral movement. Yet the industry treats identity with fragmented documentation, incomplete detection guidance, and minimal attack modeling.