Each Model examines a different dimension of identity and security failure.
They are designed to be used independently, but become most powerful when viewed together.
Rather than providing answers, the models help you ask better questions, about decisions, governance breakdowns, attacker behavior, and control interpretation.