Configuring OpenBSM for auditing read access to decoy files