This framework maps the complete adversary lifecycle across cloud identity systems, SSO platforms, federation protocols including OAuth and SAML, machine identities, API automation frameworks, and sophisticated token abuse techniques. IAC serves as the foundational taxonomy for understanding how APT groups, ransomware operators, and malicious insiders navigate identity systems to achieve their objectives.