Sounds like you never encountered a rogue DHCP installation.
Or worked on a secure network with more than one segment.
Static IPs are a must on any corporate network - knowing where the assets are is mandatory, not being dependent on some other server that may have vanished, may not be up yet, may have been compromised, may not be accessible etc etc.
Rogue DHCP, DNS and more .. love R&D newbies that think they know what they are doing, but don't. Even funnier when it is business R&D server/network types that screw things up.
proper ACLs and other measures prevented impact from spreading beyond bldg/dept that caused the problem
Worked on global enterprise, and higher, security environments.
Static IPs for certain system that must be exactly there during initial stages of a recovery... sure.. but the vast majority of systems... No, definitely not. Proper recovery runbook means one has documented when they come up, what they are dependent on, etc. In our datacenter and branch office (a Fortune 20 company) server VLANs, there were static IPs limited to a few dozen systems globally, out of
many thousands (can't recall if Corp IT managed server count (ie corp LAN, not cloud) was over 10K systems... might have been). And this was over 15 years ago. Again, all about the right processes and monitoring
tools.
Certainly, if mgmt is preventing decent operational maturity tools and approaches (which I've seen), then one does what one must. And I've worked those environments as well