The CA CSM address spaces should be assigned a user ID that is defined to the same USS default group profile as the team of system programmers responsible for maintaining the application.
Adhering to this practice helps you simplify the USS permissions structure that is required for ongoing support and can eliminate the need to set CA CSM USS directory path permissions to read/write/delete/execute. The owning UID/GID must be the one that allows deployment users the ability to have read/write/execute within that work directory.