It is vital that automated solutions offering configuration management are well-secured. Otherwise, a hacker who makes it into a configuration management system might be able to obtain administrator access to the production environment. True False