diff --git a/LICENSE.txt b/LICENSE.txt
new file mode 100644
index 0000000000000000000000000000000000000000..455e2a7c4e7f2aed15fd5b118cd7991cc2d5e72f
--- /dev/null
+++ b/LICENSE.txt
@@ -0,0 +1,4 @@
+Copyright (C) 2021 XLAB d.o.o.
+Use of this software allowed only to MEDINA partners for the purpose of research in the scope of MEDINA project, as specified in the MEDINA Consortium Agreement.
+No commercial use allowed.
+This program is distributed without any warranty.
\ No newline at end of file
diff --git a/Security monitoring FISHY.png b/Security monitoring FISHY.png
deleted file mode 100644
index ad46f970bbf2b11b4eaa67fad5bcfaf61586f696..0000000000000000000000000000000000000000
Binary files a/Security monitoring FISHY.png and /dev/null differ
diff --git a/Security monitoring FISHY.puml b/Security monitoring FISHY.puml
deleted file mode 100644
index 8cd83d8748ca7b00731de8ecf2bf0abc8c686028..0000000000000000000000000000000000000000
--- a/Security monitoring FISHY.puml	
+++ /dev/null
@@ -1,28 +0,0 @@
-@startuml
-participant "FISHY agent" as FISHY_agent
-participant "Security monitoring Tool (appliance runtime)" as SecurityMonitoring #99FF99 
-
-group Configure FISHY security monitoring via FISHY Agent
-    FISHY_agent->SecurityMonitoring: Configure security monitroing
-    SecurityMonitoring -> SecurityMonitoring: Configure server (rules)
-    SecurityMonitoring -> SecurityMonitoring: Configure agents (register agents, define rules)
-    SecurityMonitoring -> FISHY_agent: Security monitoring configured 
-    note over SecurityMonitoring:The server and agents should be deployed beforehand via FISHY Agent
-end
-
-group Start security monitoring
-    FISHY_agent->SecurityMonitoring: Start security monitoring 
-    SecurityMonitoring -> SecurityMonitoring : Start security monitoring
-    FISHY_agent<-SecurityMonitoring: Security monitoring started
-end
-
-group Security monitoring runtime
-    FISHY_agent<-SecurityMonitoring: Send monitoring alert
-end
-
-group Stop monitoring
-    FISHY_agent ->SecurityMonitoring: Stop security monitoring
-    SecurityMonitoring ->FISHY_agent: Security monitoring stopped
-end
-
-@enduml
\ No newline at end of file
diff --git a/Security monitoring PIACERE.puml b/Security monitoring PIACERE.puml
deleted file mode 100644
index 23cf363944bd25b79df4db9e870e53b4cc0ecb2b..0000000000000000000000000000000000000000
--- a/Security monitoring PIACERE.puml	
+++ /dev/null
@@ -1,32 +0,0 @@
-@startuml
-participant RuntimeController
-participant RuntimeMonitoring
-participant SecurityMonitoring #99FF99
-participant DOML
-participant Selflearning
-
-group Configure security monitoring
-    RuntimeController->SecurityMonitoring: Start security monitoring configuration
-    SecurityMonitoring -> DOML: Acquire information about the NFRs to configure security monitoring
-    SecurityMonitoring -> SecurityMonitoring: Configure server (rules)
-    SecurityMonitoring -> SecurityMonitoring: Configure agents (register agents, define rules)
-    SecurityMonitoring -> RuntimeController: Security monitoring configured
-    note over SecurityMonitoring,RuntimeController:The server and agents should be deployed beforehand (included in the IaC already? Described within DOML/IaC implicitly?)
-end
-
-group Start security monitoring
-    RuntimeController->SecurityMonitoring: Start security monitoring 
-    SecurityMonitoring -> SecurityMonitoring : Start security monitoring
-    RuntimeController<-SecurityMonitoring: Security monitoring started
-end
-
-group Security monitoring runtime
-    Selflearning<-SecurityMonitoring: Send notification/alarm
-end
-
-group Stop security monitoring
-    RuntimeController ->SecurityMonitoring: Stop security monitoring
-    SecurityMonitoring ->RuntimeController: Security monitoring stopped
-end
-
-@enduml
\ No newline at end of file
diff --git a/out/Security monitoring PIACERE/Security monitoring PIACERE.png b/out/Security monitoring PIACERE/Security monitoring PIACERE.png
deleted file mode 100644
index 752145666405ce2e408e6b3af7dcbc71d0052e40..0000000000000000000000000000000000000000
Binary files a/out/Security monitoring PIACERE/Security monitoring PIACERE.png and /dev/null differ
diff --git a/security-monitoring-ansible/ansible/docker/tasks/main.yml b/security-monitoring-ansible/ansible/docker/tasks/main.yml
index 4e0685438aa28b955dcde22a22ded8d7863eff94..42c7d248f955f73f869acaf790d1d2788eab8b43 100644
--- a/security-monitoring-ansible/ansible/docker/tasks/main.yml
+++ b/security-monitoring-ansible/ansible/docker/tasks/main.yml
@@ -4,7 +4,7 @@
     name: docker-ce-stable
     file: docker
     description: Docker CE Stable - $basearch
-    baseurl: https://download.docker.com/linux/centos/7/$basearch/stable
+    baseurl: https://download.docker.com/linux/centos/8/$basearch/stable
     enabled: yes
     gpgcheck: yes
     gpgkey: https://download.docker.com/linux/centos/gpg
diff --git a/security-monitoring-ansible/ansible/provision-evidence-collector.yml b/security-monitoring-ansible/ansible/provision-evidence-collector.yml
index 655791cd68771f7eb3c7b1d3a715e6f115d0fb39..66aa61852554d0829274d128091edb169d41340e 100644
--- a/security-monitoring-ansible/ansible/provision-evidence-collector.yml
+++ b/security-monitoring-ansible/ansible/provision-evidence-collector.yml
@@ -4,10 +4,27 @@
     become: yes
     pre_tasks:
     - import_tasks: "{{ ansible_dir }}/docker/credentials/vars.yml"
-    roles:    
+    roles:   
       - docker
     tasks:
-      - name: Login to Docker registry
-        shell: "docker login -u {{ docker_username }} -p {{ docker_token }} {{ docker_registry }}"
+      # Required by Ansible Docker module
+      - name: Install python3.6
+        package:
+          name: python36
+          state: present
+      - name: Install docker-py
+        pip:
+          name: docker-py
+      - name: Log in to Docker image registry
+        docker_login:
+          registry: "{{ docker_registry }}"
+          username: "{{ docker_username }}"
+          password: "{{ docker_token }}"
+          reauthorize: yes
       - name: Run Docker container
-        shell: "docker run --name evidence-collector -d {{ docker_registry }}/medina/evidence-collector:latest" 
\ No newline at end of file
+        docker_container:
+          name: evidence-collector
+          image: "{{ docker_registry }}/medina/evidence-collector:latest"
+          state: started
+          pull: yes
+          restart_policy: always
\ No newline at end of file
diff --git a/security-monitoring-ansible/environments/vagrant-full-setup/Vagrantfile b/security-monitoring-ansible/environments/vagrant-full-setup/Vagrantfile
index e2ecdd6e0393258239193e9ca400ec1eaff38a69..73ff79b11f0a95e3f19c05f12f3ebfc5342ed15b 100644
--- a/security-monitoring-ansible/environments/vagrant-full-setup/Vagrantfile
+++ b/security-monitoring-ansible/environments/vagrant-full-setup/Vagrantfile
@@ -5,28 +5,28 @@ servers=[
   {
     :hostname => "manager",
     :ip => "192.168.33.10",
-    :box => "centos/7",
+    :box => "centos/8",
     :ram => 4096,
     :cpu => 2
   },  
   {
     :hostname => "agent1",
     :ip => "192.168.33.11",
-    :box => "centos/7",
+    :box => "centos/8",
     :ram => 512,
     :cpu => 1
   },
   {
     :hostname => "agent2",
     :ip => "192.168.33.12",
-    :box => "centos/7",
+    :box => "centos/8",
     :ram => 512,
     :cpu => 1
   },
   {
     :hostname => "evidence-collector",
     :ip => "192.168.33.13",
-    :box => "centos/7",
+    :box => "centos/8",
     :ram => 2048,
     :cpu => 2
   }
diff --git a/security-monitoring-architecture.puml b/security-monitoring-architecture.puml
deleted file mode 100644
index c400e8a907f0316650f0f363c84f710a3f5c980a..0000000000000000000000000000000000000000
--- a/security-monitoring-architecture.puml
+++ /dev/null
@@ -1,31 +0,0 @@
-@startuml
-skinparam nodesep 5
-
-package "Wazuh Server" {
-  [Kibana server]
-  [Kibana server] --> [ElasticSearch]: KQL
-  [Wazuh cluster] --> [ElasticSearch]: Filebeat  
-}
-interface "Log collector" as LC
-interface "File integrity monitoring" as FIM
-interface "Command execution" as CE
-interface "Security configuration assessment" as SCA
-interface "Malware detection" as MD
-interface "System inventory" as SI
-interface "Cloud security monitoring" as SCM
-interface "Container security monitoring" as CSM
-
-LC -down- [Wazuh agent]
-CE -down- [Wazuh agent]
-FIM -down- [Wazuh agent]
-SCA -down- [Wazuh agent]
-
-MD -down- [Wazuh agent]
-SI -down- [Wazuh agent]
-SCM -down- [Wazuh agent]
-CSM -down- [Wazuh agent]
-
-
-[Wazuh agent] --> [Wazuh cluster]: TCP or UDP (encrypted)
-
-@enduml
\ No newline at end of file