The presentation describes the principles of a modern vulnerability management. Here, the management of IT systems, the identification of the owners of these systems and the prioritization of security vulnerabilities play a prominent role. A practical example is used to explain how information from vulnerability management can have an impact on access to clients and information.