How modern identity strategies shape enterprise security