Yes
/export file=anynameyouwish ( minus serial number, any public WANIP information, wireguard keys ).
WHich mean
a. serial number one entry at beginning of config
b. WANIP information, so removed any PUBLIC wan ip information → could be in IP DHCP Client text, IP route text ( public IP address or public IP gateway, or if PPPOE any credentials )
c. wireguard private and public keys.
Thats it. Not that much work really
Also recommend for sanity of users if you have
- long dhcp lease lists …remove those just noise
- Scripts that have nothing to do with USING the router.
For the most part you will note that Export removes all other sensitive items.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Larsa gave a good generic response to a generic question. However your situation is very specific and complex and good luck trying to shove a round peg into a square hole 
With 10 routers and specific servers and devices needed access to those servers and of course admin to be able to access all, an IP based approach is a nightmare.
Accessing other routers via winbox for config purposes, OR all other subnets to work on servers for example, is accomplished by ensuring that at each router you have identified the trusted subnets
Typically
management-vlan=TRUSTED ( no explanation needed - local )
OFFBridgePort =TRUSTED ( no explanation needed - local )
Wireguard=TRUSTED ( remote admin coming in for router config, remote admin coming in to work on servers, generic users accessing speific servers for work )
In order to keep it simple but maintaining security, one should see that although Wireguard is considered Trusted, there is a caveat, we allow generic users to come in on wireguard.
Thus it is imperative on each router, on the forward chain to NOT let users go out wireguard carte blanche, but ONLY with specific forward chain rules.
In this way they will exit the wireguard tunnel at any router and only be allowed to reach the destination address permitted.
In this manner one does not need to maintain long assed lists of admin IP addresses one has on each router, which would need to be put on every router…
These rules allow the admin to reach both the config and servers locally and the same remotely over wireguard.
They also allow any user to come exit the router and go to the LAN destination they have been allowed to visit on their home router forward chain firewall rules.
/input chain
add chain=input action=accept in-interface-list=TRUSTED
/forward chain
add chain=forward action=accept in-interface-list=TRUSTED out-interface-list=LAN
This relies on ensuring at each router, you only let local users, in non-trusted subnet, access to needed specific subnets in the forward chain over wireguard.
/forward chain
add chain=forward action=accept comment=“iot R1 to iotServerR2” in-interface=vlan-IOT-r1 dst-address=ServerR2 out-interface=wireguard
add chain=forward action=accept comment=“camerasR1 to CameraServerR3” in-interface=vlan-Camera-r1 dst-address=ServerR2 out-interface=wireguard.
In this way, no matter where you as the admin are located ( working at the managment vlan or offbridge port), you can reach any other router for config purposes or any LAN subnet for working on servers etc. All other users are restricted to the subnets on the routers they need access to.
This is as efficient and easy as it gets.