Narrative intro
Identity is the modern perimeter. The four pillars below are the identity capability area in maturity order: tenant and RBAC foundation, conditional access, privileged access management, identity threat detection. Together they constitute a mature identity capability — individually they're partial postures that don't add up. Identity sits across the org chart: CIO owns the platform; CISO owns the threat-detection posture. This map is dual-persona for that reason. Use it for joint identity programme conversations, identity-maturity benchmarking, and the structural decisions that determine whether identity is a single capability or two parallel ones.