diff --git a/src/main/helm/templates/network_policy.yaml b/src/main/helm/templates/network_policy.yaml
index e5b2c533cc56546800a78f562d1d17fefe4403f9..b49c282354091844db32a2ab99d7e25d93ccba78 100644
--- a/src/main/helm/templates/network_policy.yaml
+++ b/src/main/helm/templates/network_policy.yaml
@@ -59,10 +59,10 @@ spec:
   - from:
     - namespaceSelector:
         matchLabels:
-          kubernetes.io/metadata.name: {{((.Values.ozgcloud).antragraum).antragsraumProxyNamespace | default "antragsraum-proxy"}}
+          kubernetes.io/metadata.name: {{((.Values.ozgcloud).antragraum).antragraumProxyNamespace | default "antragraum-proxy"}}
       podSelector: 
         matchLabels:
-          component: antragsraum-proxy
+          component: antragraum-proxy
 {{- end }}
 
   - from:
diff --git a/src/test/helm/deployment_antragraum_test.yaml b/src/test/helm/deployment_antragraum_test.yaml
index 29ed00d4c4d008336993014f6b2defd03378fc51..4502b67d7001df5d768cb105168a6681f2c8917c 100644
--- a/src/test/helm/deployment_antragraum_test.yaml
+++ b/src/test/helm/deployment_antragraum_test.yaml
@@ -35,7 +35,7 @@ set:
     bezeichner: helm
   imagePullSecret: test-image-pull-secret
 tests:
-  - it: should set antragsraum values
+  - it: should set antragraum values
     set:
       ozgcloud:
         antragraum:
@@ -69,7 +69,7 @@ tests:
             name: ozgcloud_antragraum_decryptionCertificate
             value: "file:/keystore/bayernid/bayern-id.crt"
 
-  - it: should not generate antragsraum config if disabled
+  - it: should not generate antragraum config if disabled
     set:
       ozgcloud.antragraum.enabled: false
     asserts:
@@ -114,7 +114,7 @@ tests:
             name: bayernid-certificate
             mountPath: "/keystore/bayernid"
             readOnly: true
-  - it: should not set volumeMounts if antragsraum is disabled
+  - it: should not set volumeMounts if antragraum is disabled
     set:
       ozgcloud.antragraum.enabled: false
     asserts:
@@ -140,7 +140,7 @@ tests:
             secret:
               secretName: bayernid-certificate
               optional: false
-  - it: should not have volumes if antragsraum is disabled
+  - it: should not have volumes if antragraum is disabled
     set:
       ozgcloud.antragraum.enabled: false
     asserts:
diff --git a/src/test/helm/network_policy_test.yaml b/src/test/helm/network_policy_test.yaml
index 8c72186be1545a2ce6c85d8df72f4d8d1e73838a..618dba7961d5776726e0c51387ae466a5036a409 100644
--- a/src/test/helm/network_policy_test.yaml
+++ b/src/test/helm/network_policy_test.yaml
@@ -154,10 +154,10 @@ tests:
           from:
             - namespaceSelector:
                 matchLabels:
-                  kubernetes.io/metadata.name: antragsraum-proxy
+                  kubernetes.io/metadata.name: antragraum-proxy
               podSelector: 
                 matchLabels:
-                  component: antragsraum-proxy
+                  component: antragraum-proxy
 
   - it: should set ingress rule for antragraum-proxy if antragraum is enabled
     set:
@@ -166,7 +166,7 @@ tests:
       ozgcloud:
         antragraum:
           enabled: true
-          antragsraumProxyNamespace: antragsraum-proxy
+          antragraumProxyNamespace: antragraum-proxy
     asserts:
     - contains:
         path: spec.ingress
@@ -174,10 +174,10 @@ tests:
           from:
             - namespaceSelector:
                 matchLabels:
-                  kubernetes.io/metadata.name: antragsraum-proxy
+                  kubernetes.io/metadata.name: antragraum-proxy
               podSelector: 
                 matchLabels:
-                  component: antragsraum-proxy
+                  component: antragraum-proxy
 
 
   - it: should not add ingress rule for antragraum if antragraum is disabled