diff --git a/README.md b/README.md
index 2639887..602550f 100644
--- a/README.md
+++ b/README.md
@@ -22,6 +22,8 @@ kind: Secret
 metadata:
   namespace: kube-system
   name: csi-s3-secret
+  # Namespace depends on the configuration in the storageclass.yaml
+  namespace: kube-system
 stringData:
   accessKeyID: <YOUR_ACCESS_KEY_ID>
   secretAccessKey: <YOUR_SECRET_ACCES_KEY>
@@ -67,7 +69,7 @@ csi-s3-pvc   Bound     pvc-c5d4634f-8507-11e8-9f33-0e243832354b   5Gi        RWO
 3. Create a test pod which mounts your volume:
 
 ```bash
-kubectl create -f poc.yaml
+kubectl create -f pod.yaml
 ```
 
 If the pod can start, everything should be working.
diff --git a/deploy/kubernetes/attacher.yaml b/deploy/kubernetes/attacher.yaml
index 46c3aa2..ffcfe1e 100644
--- a/deploy/kubernetes/attacher.yaml
+++ b/deploy/kubernetes/attacher.yaml
@@ -23,7 +23,7 @@ rules:
     verbs: ["get", "list", "watch"]
   - apiGroups: ["storage.k8s.io"]
     resources: ["volumeattachments"]
-    verbs: ["get", "list", "watch", "update"]
+    verbs: ["get", "list", "watch", "update", "patch"]
 ---
 kind: ClusterRoleBinding
 apiVersion: rbac.authorization.k8s.io/v1
@@ -64,6 +64,9 @@ spec:
       app: "csi-attacher-s3"
   serviceName: "csi-attacher-s3"
   replicas: 1
+  selector:
+    matchLabels:
+      app: csi-attacher-s3
   template:
     metadata:
       labels:
@@ -72,7 +75,7 @@ spec:
       serviceAccount: csi-attacher-sa
       containers:
         - name: csi-attacher
-          image: quay.io/k8scsi/csi-attacher:v1.1.0
+          image: quay.io/k8scsi/csi-attacher:v2.2.0
           args:
             - "--v=4"
             - "--csi-address=$(ADDRESS)"
diff --git a/deploy/kubernetes/csi-s3.yaml b/deploy/kubernetes/csi-s3.yaml
index b55e581..8532696 100644
--- a/deploy/kubernetes/csi-s3.yaml
+++ b/deploy/kubernetes/csi-s3.yaml
@@ -56,7 +56,7 @@ spec:
       hostNetwork: true
       containers:
         - name: driver-registrar
-          image: quay.io/k8scsi/csi-node-driver-registrar:v1.1.0
+          image: quay.io/k8scsi/csi-node-driver-registrar:v1.2.0
           args:
             - "--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)"
             - "--v=4"
diff --git a/deploy/kubernetes/provisioner.yaml b/deploy/kubernetes/provisioner.yaml
index 55f7ff6..9aa922d 100644
--- a/deploy/kubernetes/provisioner.yaml
+++ b/deploy/kubernetes/provisioner.yaml
@@ -63,6 +63,9 @@ spec:
       app: "csi-provisioner-s3"
   serviceName: "csi-provisioner-s3"
   replicas: 1
+  selector:
+    matchLabels:
+      app: csi-provisioner-s3
   template:
     metadata:
       labels:
@@ -71,7 +74,7 @@ spec:
       serviceAccount: csi-provisioner-sa
       containers:
         - name: csi-provisioner
-          image: quay.io/k8scsi/csi-provisioner:v1.1.0
+          image: quay.io/k8scsi/csi-provisioner:v1.3.1
           args:
             - "--provisioner=ch.ctrox.csi.s3-driver"
             - "--csi-address=$(ADDRESS)"
diff --git a/deploy/kubernetes/storageclass.yaml b/deploy/kubernetes/storageclass.yaml
index 1bd02ed..ad6b39c 100644
--- a/deploy/kubernetes/storageclass.yaml
+++ b/deploy/kubernetes/storageclass.yaml
@@ -15,4 +15,4 @@ parameters:
   csi.storage.k8s.io/node-stage-secret-name: csi-s3-secret
   csi.storage.k8s.io/node-stage-secret-namespace: kube-system
   csi.storage.k8s.io/node-publish-secret-name: csi-s3-secret
-  csi.storage.k8s.io/node-publish-secret-namespace: kube-system
\ No newline at end of file
+  csi.storage.k8s.io/node-publish-secret-namespace: kube-system