diff --git a/deployment/helm/ci/argocd.yaml b/deployment/helm/ci/argocd.yaml
new file mode 100644
index 0000000000000000000000000000000000000000..05d3988b32c0063c6b55d3c4fa957e0b205325cd
--- /dev/null
+++ b/deployment/helm/ci/argocd.yaml
@@ -0,0 +1,30 @@
+# ArgoCD Application Definition
+source:
+  repoURL: "{{ .RepoURL }}"
+  path: "{{ .Path }}"
+  targetRevision: "{{ .TargetRevision }}"
+
+applications:
+  - name: apps-of-apps
+    namespace: argocd
+    enabled: true
+    k8sAPI: https://kubernetes.default.svc
+    project: my-project
+    sourcePath: "."
+    sourceRef: "main"
+    chartName: "my-name"
+    ignoreDifferences:
+      - group: admissionregistration.k8s.io
+        kind: ValidatingWebhookConfiguration
+        name: cert-manager-webhook
+        jsonPointers:
+          - /webhooks/0/namespaceSelector/matchExpressions/2
+    helmValues:
+      - my_chart/values.yaml # Include values from the Helm chart
+
+  - name: example-app
+    enabled: true
+    sourcePath: "."
+    helmValues:
+      - my_chart/values.yaml # Include values from the Helm chart
+      - my_chart/example-values.yaml # Include additional example-specific values
diff --git a/deployment/helm/templates/argocd/argo-application.yaml b/deployment/helm/templates/argocd/argo-application.yaml
new file mode 100644
index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391
diff --git a/deployment/helm/templates/argocd/argo-project.yaml b/deployment/helm/templates/argocd/argo-project.yaml
new file mode 100644
index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391
diff --git a/deployment/helm/templates/istio/autorization-rules.yaml b/deployment/helm/templates/istio/autorization-rules.yaml
new file mode 100644
index 0000000000000000000000000000000000000000..9800b2de4c0401fd41c2a49ca842cfd7cb905a38
--- /dev/null
+++ b/deployment/helm/templates/istio/autorization-rules.yaml
@@ -0,0 +1,18 @@
+# templates/istio/authorization-rules.yaml
+apiVersion: security.istio.io/v1beta1
+kind: AuthorizationPolicy
+metadata:
+  name: { { include "my_chart.fullname" . } }
+spec:
+  selector:
+    matchLabels:
+      app.kubernetes.io/name: { { include "my_chart.name" . } }
+      app.kubernetes.io/instance: { { .Release.Name } }
+  action: ALLOW
+  rules:
+    - from:
+        - source:
+            principals: ["cluster.local/ns/default/sa/default"]
+      to:
+        - operation:
+            methods: ["GET"]
diff --git a/deployment/helm/templates/istio/gateway.yaml b/deployment/helm/templates/istio/gateway.yaml
new file mode 100644
index 0000000000000000000000000000000000000000..65dfaa3545bab83e5064d7f7f7d222d48bdf66e6
--- /dev/null
+++ b/deployment/helm/templates/istio/gateway.yaml
@@ -0,0 +1,15 @@
+# templates/istio/gateway.yaml
+apiVersion: networking.istio.io/v1alpha3
+kind: Gateway
+metadata:
+  name: my-chart-gateway
+spec:
+  selector:
+    istio: ingressgateway
+  servers:
+    - port:
+        number: 80
+        name: http
+        protocol: HTTP
+      hosts:
+        - "*"
diff --git a/deployment/helm/templates/istio/virtual-service.yaml b/deployment/helm/templates/istio/virtual-service.yaml
new file mode 100644
index 0000000000000000000000000000000000000000..28307d401c7d3232454db523645c09e93977d789
--- /dev/null
+++ b/deployment/helm/templates/istio/virtual-service.yaml
@@ -0,0 +1,16 @@
+# templates/istio/virtual-service.yaml
+apiVersion: networking.istio.io/v1alpha3
+kind: VirtualService
+metadata:
+  name: { { include "my_chart.fullname" . } }
+spec:
+  hosts:
+    - "*"
+  gateways:
+    - my-chart-gateway
+  http:
+    - route:
+        - destination:
+            host: { { include "my_chart.fullname" . } }
+            port:
+              number: 80