A Tool-Agnostic Approach to Identity Security