These graphs model privilege escalation paths, token replay sequences, machine identity abuse, SaaS and cloud pivoting, cross-cloud privilege chains, and hidden identity trust relationships. They provide security teams with actionable visibility into how identity weaknesses combine into exploitable attack paths.