It might be more the information on the devices which relates to the configuration as you mentioned (hostname, IP addresses, VLANs, interface descr. etc.), if a device becomes obsolete or gets lost (stolen), how can this type of information be decrypted? Is there only Meraki who knows the key and is this safe?