Patent attributes
Access to computing assets is controlled by dynamically selecting an authentication process for an access attempt to a computing asset. In an example embodiment, when an indication of an access attempt for a computing asset is received, a security level associated with the computing asset is determined. Based on the security level associated with the computing asset, an authentication process is selected from a plurality of authentication processes, and the selected authentication process is executed in relation to the access attempt for the computing asset. In further embodiments, the authentication process is further selected based on a comparison of an access characteristic associated with the access attempt for the computing asset and an access characteristic for a user associated with the access attempt.