diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml
index 09180238cdf5216f656a4e0c94ca5ee81db861e5..9873f784b92a06d48beaaca254b04d157fd37686 100644
--- a/.gitlab-ci.yml
+++ b/.gitlab-ci.yml
@@ -1,5 +1,5 @@
 image: 
-  name: hashicorp/terraform:0.14.8
+  name: hashicorp/terraform:0.14.9
   entrypoint:
     - '/usr/bin/env'
     - 'PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin'
@@ -9,26 +9,17 @@ stages:
   - Staging Plan
   - Staging Apply
   - Integration Test
-  - Production Plan
-  - Production Apply
   - Destroy
 
-Test and Lint:
-  stage: Test and Lint
-  script:
-    - echo "test to do"
-  rules:
-    - if: '$CI_MERGE_REQUEST_TARGET_BRANCH_NAME =~ /^(master|production)$/ || $CI_COMMIT_BRANCH =~ /^(master|production)$/'
-
 Validate Terraform:
   stage: Test and Lint
   script:
     - cd deploy/
+    - terraform fmt -check -recursive
     - terraform init -backend=false
     - terraform validate
-    - terraform fmt -check
   rules:
-    - if: '$CI_MERGE_REQUEST_TARGET_BRANCH_NAME =~ /^(master|production)$/ || $CI_COMMIT_BRANCH =~ /^(master|production)$/'
+    - if: '$CI_MERGE_REQUEST_TARGET_BRANCH_NAME =~ /^(master)$/ || $CI_COMMIT_BRANCH =~ /^(master)$/'
 
 Staging Plan:
   stage: Staging Plan
@@ -36,9 +27,9 @@ Staging Plan:
     - cd deploy/
     - terraform init
     - terraform workspace select staging || terraform workspace new staging
-    - terraform plan
+    - terraform plan -var-file=vars/staging.tfvars
   rules:
-    - if: '$CI_COMMIT_BRANCH =~ /^(master|production)$/'
+    - if: '$CI_MERGE_REQUEST_TARGET_BRANCH_NAME =~ /^(master)$/ || $CI_COMMIT_BRANCH =~ /^(master)$/'
 
 Staging Apply:
   stage: Staging Apply
@@ -50,28 +41,28 @@ Staging Apply:
     - cd -
     - terraform init
     - terraform workspace select staging
-    - terraform apply -auto-approve
+    - terraform apply -var-file=vars/staging.tfvars -auto-approve
     - echo "API_ENDPOINT=$(terraform output -raw api_endpoint)" >> ../deploy.env
   artifacts:
     reports:
       dotenv: deploy.env
   rules:
-    - if: '$CI_COMMIT_BRANCH =~ /^(master|production)$/'
+    - if: '$CI_COMMIT_BRANCH =~ /^(master)$/'
 
 Integration Tests:
   stage: Integration Test
   image: 
-    name: postman/newman
+    name: postman/newman:5
     entrypoint: [""]
   script:
     - newman run Lambda_CRUD.postman_collection.json --env-var "endpoint=$API_ENDPOINT"
   rules:
-    - if: '$CI_COMMIT_BRANCH =~ /^(master|production)$/'
+    - if: '$CI_COMMIT_BRANCH =~ /^(master)$/'
 
 Load Tests:
   stage: Integration Test
   image: 
-    name: peterevans/vegeta
+    name: peterevans/vegeta:6.9
     entrypoint: [""]
   script:
     - echo "GET $API_ENDPOINT/crud" | vegeta attack -duration=3s -rate=100/s | vegeta report
@@ -79,47 +70,16 @@ Load Tests:
     - echo "PATCH $API_ENDPOINT/crud" | vegeta attack -duration=3s -rate=100/s | vegeta report
     - echo "DELETE $API_ENDPOINT/crud" | vegeta attack -duration=3s -rate=100/s | vegeta report
   rules:
-    - if: '$CI_COMMIT_BRANCH =~ /^(master|production)$/'
+    - if: '$CI_COMMIT_BRANCH =~ /^(master)$/'
       when: manual
 
-Production Plan:
-  stage: Production Plan
-  script:
-    - cd deploy/
-    - terraform init
-    - terraform workspace select production || terraform workspace new production
-    - terraform plan
-  rules:
-    - if: '$CI_COMMIT_BRANCH == "production"'
-
-Production Apply:
-  stage: Production Apply
-  script:
-    - cd deploy/
-    - terraform init
-    - terraform workspace select production
-    - terraform apply -auto-approve
-  rules:
-    - if: '$CI_COMMIT_BRANCH == "production"'
-
 Staging Destroy:
   stage: Destroy
   script:
     - cd deploy/
     - terraform init
     - terraform workspace select staging
-    - terraform destroy -auto-approve
-  rules: 
-    - if: '$CI_COMMIT_BRANCH =~ /^(master|production)$/'
-      when: manual
-
-Production Destroy:
-  stage: Destroy
-  script:
-    - cd deploy/
-    - terraform init
-    - terraform workspace select production
-    - terraform destroy -auto-approve
+    - terraform destroy -var-file=vars/staging.tfvars -auto-approve
   rules: 
-    - if: '$CI_COMMIT_BRANCH == "production"'
+    - if: '$CI_COMMIT_BRANCH =~ /^(master)$/'
       when: manual
diff --git a/deploy/.terraform.lock.hcl b/deploy/.terraform.lock.hcl
index 5faf07bdb2dce9e789687584079d24a62e4e24ed..e1ec1ea8b12df7a000c4c1d4f7a069b802d284df 100644
--- a/deploy/.terraform.lock.hcl
+++ b/deploy/.terraform.lock.hcl
@@ -3,7 +3,7 @@
 
 provider "registry.terraform.io/hashicorp/archive" {
   version     = "2.1.0"
-  constraints = ">= 2.1.0"
+  constraints = "~> 2.1"
   hashes = [
     "h1:K4Q9hmTnCrGbXZBq2hf6CbekHx5oXFwPBmWOwAPNqtM=",
     "h1:Rjd4bHMA69V+16tiriAUTW8vvqoljzNLmEaRBCgzpUs=",
@@ -23,39 +23,22 @@ provider "registry.terraform.io/hashicorp/archive" {
 }
 
 provider "registry.terraform.io/hashicorp/aws" {
-  version     = "3.30.0"
-  constraints = ">= 3.30.0"
+  version     = "3.33.0"
+  constraints = "~> 3.30"
   hashes = [
-    "h1:H1Vg0BX4XMIQAE6NEOR95wst+ETcrv/tSwz+m04rszE=",
-    "h1:PmKa3uxO2mDA5FJfGmpX+4e0x70vFLV5Ka9NxkuMpUo=",
-    "h1:z9kdXY2A/+dIZrPy9hNlg/B5I/AuETQsp0jz9EgprIQ=",
-    "zh:01f562a6a31fe46a8ca74804f360e3452b26f71abc549ce1f0ab5a8af2484cdf",
-    "zh:25bacc5ed725051f0ab1f7d575e45c901e5b8e1d50da4156a31dda92b2b7e481",
-    "zh:349b79979d9169db614d8ebd1bc2e0caeb7a38dc816e261b8b2b4b5204615519",
-    "zh:5e41446acc54c6fc15e82c3fa14b72174b30eba81e0711ede297e5620c55a628",
-    "zh:68ad98f6d612bdc35a65d48950abc8e75c69decb49db28258ce8eeb5458586b7",
-    "zh:704603d65e8bac17d203b57c2db142c3134a91076e1b4a31c40f75eb3257dde8",
-    "zh:a362c700032b2db047d16007d52f28b3f216d32671b6b355d23bdaa082c66a4b",
-    "zh:bd197797b41268de3c93cad02b7c655dc0c4d8661abb37544ca049e6b1eccae6",
-    "zh:deb12ef0e3396a71d485977ddc14b695775f7937097ebf2b2f53ed348a4365e7",
-    "zh:ec8a7d0f02738f290107d39bf401d68ddce82a95cd9d998003f7e04b3a196411",
-    "zh:ffcc43b6c5e7f26c55e2a8c539d7370fca8042722400a3e06bdce4240bd7088a",
-  ]
-}
-
-provider "registry.terraform.io/hashicorp/template" {
-  version = "2.2.0"
-  hashes = [
-    "h1:94qn780bi1qjrbC3uQtjJh3Wkfwd5+tTtJHOb7KTg9w=",
-    "zh:01702196f0a0492ec07917db7aaa595843d8f171dc195f4c988d2ffca2a06386",
-    "zh:09aae3da826ba3d7df69efeb25d146a1de0d03e951d35019a0f80e4f58c89b53",
-    "zh:09ba83c0625b6fe0a954da6fbd0c355ac0b7f07f86c91a2a97849140fea49603",
-    "zh:0e3a6c8e16f17f19010accd0844187d524580d9fdb0731f675ffcf4afba03d16",
-    "zh:45f2c594b6f2f34ea663704cc72048b212fe7d16fb4cfd959365fa997228a776",
-    "zh:77ea3e5a0446784d77114b5e851c970a3dde1e08fa6de38210b8385d7605d451",
-    "zh:8a154388f3708e3df5a69122a23bdfaf760a523788a5081976b3d5616f7d30ae",
-    "zh:992843002f2db5a11e626b3fc23dc0c87ad3729b3b3cff08e32ffb3df97edbde",
-    "zh:ad906f4cebd3ec5e43d5cd6dc8f4c5c9cc3b33d2243c89c5fc18f97f7277b51d",
-    "zh:c979425ddb256511137ecd093e23283234da0154b7fa8b21c2687182d9aea8b2",
+    "h1:4+2CO4Pb3BKwI0MD+DBmnX5GFsYTs47y6w4/kQbPJIQ=",
+    "h1:UJcZV5+xJmHHDCsm+s8+xMonccZvVD0jdGwHAoi7nJg=",
+    "h1:dfszrcpjXjaZN3XsCz7TWhucZkNxZ6AVyoL890K+RdI=",
+    "zh:0e89b10323a59de9dd6f286423cc172cb1733683d654c886493c3bd4e43e6290",
+    "zh:288df55f0f4fac1e920cfa61616ac42a4e4414bd7a637902db03d0c7101f14ca",
+    "zh:303c9136c5bf97e6c1deda6e27f0d0931fe0eaaab547bf219b996623fb0ad522",
+    "zh:457a5da9f323e2781942df534153d000ea81727798ee0771177009d84b04aad7",
+    "zh:857fa3e29cc25ace76556a5edfded41628a3380cebf457e627576a83084852f8",
+    "zh:85e1eb383372f834630fac7b02ec9ae1e33d24d61cf5a7d832583a16e6b5add4",
+    "zh:9dd01eb05ac73146ac5f25421b7683fe4bffec23e408162887e1265f9bfe8462",
+    "zh:b1561e1335754ec93a54f45c18dc1cab70f38bc08adf244d793791134f5641ef",
+    "zh:bb96f57b80e3d94ee4bc05a5450fdd796424272b46cfc67ff9d094d5316c5fac",
+    "zh:e4ce241d8b5dd1124dc0f1da6c0840ab777de8717dac6e76afbbad9883f5ce34",
+    "zh:f2b292e813844d6d611db89017fc420ac05f2e3b25324e3c893481d375e23396",
   ]
 }
diff --git a/deploy/api-gateway.tf b/deploy/api_gateway.tf
similarity index 96%
rename from deploy/api-gateway.tf
rename to deploy/api_gateway.tf
index f8443d9eb855838b89dd259185a47b6812ba3ba4..7b31edb8c70cebd700d1a002dd897e0e23365bf6 100644
--- a/deploy/api-gateway.tf
+++ b/deploy/api_gateway.tf
@@ -1,6 +1,7 @@
 resource "aws_api_gateway_rest_api" "main" {
   name        = "${local.prefix}-main"
   description = "Internet facing API in order to access Lambda for DynamoDB CRUD operations"
+  tags        = local.common_tags
 }
 
 resource "aws_api_gateway_resource" "access" {
@@ -56,6 +57,7 @@ resource "aws_lambda_permission" "crud" {
   # within the API Gateway REST API.
   source_arn = "${aws_api_gateway_rest_api.main.execution_arn}/*/*"
 }
+
 resource "aws_lambda_permission" "index" {
   statement_id  = "AllowAPIGatewayInvoke"
   action        = "lambda:InvokeFunction"
@@ -76,6 +78,7 @@ resource "aws_api_gateway_deployment" "main" {
   }
 
   rest_api_id = aws_api_gateway_rest_api.main.id
+
   lifecycle {
     create_before_destroy = true
   }
@@ -89,6 +92,10 @@ resource "aws_api_gateway_stage" "main" {
   tags                 = local.common_tags
 }
 
+output "api_endpoint" {
+  value = aws_api_gateway_stage.main.invoke_url
+}
+
 resource "aws_api_gateway_method_settings" "general_settings" {
   rest_api_id = aws_api_gateway_rest_api.main.id
   stage_name  = aws_api_gateway_stage.main.stage_name
diff --git a/deploy/cloudwatch_alarms.tf b/deploy/cloudwatch_alarms.tf
index 2aaadeb63c2f4e32eb39bf0f8182204e87467ea1..f3d2ce7a85b47ae63dad4f82b697be94e46b0553 100644
--- a/deploy/cloudwatch_alarms.tf
+++ b/deploy/cloudwatch_alarms.tf
@@ -83,4 +83,4 @@ resource "aws_lambda_permission" "with_sns" {
   function_name = aws_lambda_function.slack.arn
   principal     = "sns.amazonaws.com"
   source_arn    = data.aws_sns_topic.cloudmon.arn
-}
\ No newline at end of file
+}
diff --git a/deploy/cloudwatch_api_logs.tf b/deploy/cloudwatch_api_logs.tf
index 2120e552377bca8055bd1762d3715e0865187b29..a93dc1e985fd65ce41f63fc330dd013358de8d9b 100644
--- a/deploy/cloudwatch_api_logs.tf
+++ b/deploy/cloudwatch_api_logs.tf
@@ -1,9 +1,11 @@
 locals {
   API_GATEWAY_LOG_GROUP = "API-Gateway-Execution-Logs_${split("-", aws_api_gateway_stage.main.id)[1]}/${aws_api_gateway_stage.main.stage_name}"
 }
+
 output "log_groupe_name" {
   value = local.API_GATEWAY_LOG_GROUP
 }
+
 resource "aws_lambda_function" "logs" {
   filename                       = data.archive_file.lambda_logs_file.output_path
   function_name                  = "${local.prefix}-logs-apigw"
@@ -59,8 +61,7 @@ data "archive_file" "lambda_logs_event_file" {
 }
 
 resource "aws_iam_role" "iam_for_lambda_logs" {
-  name = "${local.prefix}-lambda-admin-cloudwatch-logs"
-
+  name               = "${local.prefix}-lambda-admin-cloudwatch-logs"
   assume_role_policy = file("./templates/lambda/assume-role-policy.json")
 }
 
@@ -72,4 +73,4 @@ resource "aws_iam_role_policy_attachment" "lambda_logs_FA" {
 resource "aws_iam_role_policy_attachment" "lambda_cloudwatch_FA" {
   role       = aws_iam_role.iam_for_lambda_logs.name
   policy_arn = "arn:aws:iam::aws:policy/CloudWatchFullAccess"
-}
\ No newline at end of file
+}
diff --git a/deploy/dashboard.tf b/deploy/dashboard.tf
index 38486f608acc4324533d9f224ed5a36b665dcff8..2b100c5c6197dcb641a08e5657711e5248695089 100644
--- a/deploy/dashboard.tf
+++ b/deploy/dashboard.tf
@@ -11,7 +11,3 @@ resource "aws_cloudwatch_dashboard" "main" {
 
   })
 }
-
-output "dashboard_json" {
-  value = aws_cloudwatch_dashboard.main.dashboard_body
-}
\ No newline at end of file
diff --git a/deploy/docker-compose.yml b/deploy/docker-compose.yml
index beb2ec4c8005312eeac94024a5e2e9b410cca052..e40688ebb268ffec3d21d3e5ddae0e648d2c226f 100644
--- a/deploy/docker-compose.yml
+++ b/deploy/docker-compose.yml
@@ -2,7 +2,7 @@ version: '3.7'
 
 services:
   terraform:
-    image: hashicorp/terraform:0.14.8
+    image: hashicorp/terraform:0.14.9
     volumes:
       - .:/infra
     working_dir: /infra
diff --git a/deploy/dynamodb.tf b/deploy/dynamodb.tf
index 5c7f89fef3145bbd653e9c9e1212d83a613b80c9..66d4d049e66d14c35239cbc693ee5fcff90de329 100644
--- a/deploy/dynamodb.tf
+++ b/deploy/dynamodb.tf
@@ -2,13 +2,21 @@ resource "aws_dynamodb_table" "main" {
   name           = "${local.prefix}-main-db"
   hash_key       = "ID"
   billing_mode   = "PROVISIONED"
-  write_capacity = 5
-  read_capacity  = 5
+  read_capacity  = var.dynamodb_read_capacity
+  write_capacity = var.dynamodb_write_capacity
 
   attribute {
     name = "ID"
     type = "S"
   }
 
+  point_in_time_recovery {
+    enabled = var.dynamodb_enable_pitr
+  }
+
   tags = local.common_tags
+
+  lifecycle {
+    prevent_destroy = true
+  }
 }
diff --git a/deploy/lambda.tf b/deploy/lambda.tf
index 46eb720343150557c3927bef2e348d25c214f479..ee4146e26ac7a657bbca6603736ad0d9d7aaa855 100644
--- a/deploy/lambda.tf
+++ b/deploy/lambda.tf
@@ -46,11 +46,10 @@ resource "aws_lambda_function" "index" {
   tags = local.common_tags
 }
 
-
 resource "aws_iam_role" "iam_for_lambda" {
-  name = "${local.prefix}-lambda"
-
+  name               = "${local.prefix}-lambda"
   assume_role_policy = file("./templates/lambda/assume-role-policy.json")
+  tags               = local.common_tags
 }
 
 # See also the following AWS managed policy: AWSLambdaBasicExecutionRole
@@ -58,8 +57,7 @@ resource "aws_iam_policy" "lambda_logging" {
   name        = "${local.prefix}-lambda_logging"
   path        = "/"
   description = "IAM policy for logging from a lambda"
-
-  policy = file("./templates/lambda/lambda-policy.json")
+  policy      = file("./templates/lambda/lambda-policy.json")
 }
 
 resource "aws_iam_role_policy_attachment" "lambda_logs" {
diff --git a/deploy/main.tf b/deploy/main.tf
index 7f940c066e1a41640ee04fcb71494ecc3d03e646..fe1b750d8c5f37b573dd6594a17f6b0df1e8aed2 100644
--- a/deploy/main.tf
+++ b/deploy/main.tf
@@ -1,21 +1,22 @@
 terraform {
 
   backend "s3" {
-    bucket         = "edebrye-cloud-monitor-tfstate"
-    key            = "cloud-monitor-app.tfstate"
-    region         = "eu-west-1"
-    encrypt        = true
-    dynamodb_table = "edebrye-cloud-monitor-tfstate-lock"
+    bucket               = "edebrye-cloud-monitor-tfstate"
+    key                  = "cloud-monitor-app.tfstate"
+    region               = "eu-west-1"
+    encrypt              = true
+    dynamodb_table       = "edebrye-cloud-monitor-tfstate-lock"
+    workspace_key_prefix = ""
   }
 
   required_providers {
     aws = {
-      version = ">= 3.30.0"
+      version = "~> 3.30"
       source  = "hashicorp/aws"
     }
 
     archive = {
-      version = ">=2.1.0"
+      version = "~> 2.1"
       source  = "hashicorp/archive"
     }
   }
@@ -49,4 +50,4 @@ locals {
   }
 }
 
-data "aws_region" "current" {}
\ No newline at end of file
+data "aws_region" "current" {}
diff --git a/deploy/outputs.tf b/deploy/outputs.tf
deleted file mode 100644
index 2fae12f26feb0bc189626f902557918b2b3bd98c..0000000000000000000000000000000000000000
--- a/deploy/outputs.tf
+++ /dev/null
@@ -1,3 +0,0 @@
-output "api_endpoint" {
-  value = aws_api_gateway_stage.main.invoke_url
-}
\ No newline at end of file
diff --git a/deploy/variables.tf b/deploy/variables.tf
index 2cb2f1aa25838b3b3157512e380b2b5a17cf9d83..13fa0d6466eb8c60bcfc1b3074029ccd9c9128b9 100644
--- a/deploy/variables.tf
+++ b/deploy/variables.tf
@@ -19,11 +19,23 @@ variable "aws_region" {
 }
 
 variable "slack_webhook_url" {
-  sensitive = true
   type      = string
+  sensitive = true
 }
 
 variable "sns_topic_name" {
-  default = "edebrye-cloudmon"
   type    = string
+  default = "edebrye-cloudmon"
+}
+
+variable "dynamodb_read_capacity" {
+  type = number
+}
+
+variable "dynamodb_write_capacity" {
+  type = number
+}
+
+variable "dynamodb_enable_pitr" {
+  type = bool
 }
diff --git a/deploy/vars/staging.tfvars b/deploy/vars/staging.tfvars
new file mode 100644
index 0000000000000000000000000000000000000000..6980b79e8433ad023e3dabb12b3863ab49be3100
--- /dev/null
+++ b/deploy/vars/staging.tfvars
@@ -0,0 +1,3 @@
+dynamodb_read_capacity  = 5
+dynamodb_write_capacity = 5
+dynamodb_enable_pitr    = true
diff --git a/deploy/xray.tf b/deploy/xray.tf
index 0316034dab4213a86cb0df4683eeb654621b5c6d..b336b8615501d9eb00349bf4752fd62a42ee122e 100644
--- a/deploy/xray.tf
+++ b/deploy/xray.tf
@@ -2,4 +2,4 @@ resource "aws_xray_group" "main" {
   group_name        = "${local.prefix}-group"
   filter_expression = "http.url CONTAINS \"${aws_api_gateway_stage.main.invoke_url}\""
   tags              = local.common_tags
-}
\ No newline at end of file
+}