A lot of IT auditors say "The manual says you shouldnt have this port open so close it" rather than looking at the broader picture. I don't think the risk is proportionate to the control and in other areas of the business we wouldn't get away with making some of the recommendations for controls that IT say we need...
Actually most IT security auditors don't approach things as a "the manual says" but rather ask the question why is this port open, what are the attack vectors, what is the likelihood of those attack vectors being exploited, and what is the potential damage which can be done.
Basically it comes down to a risk vs useability argument, and that takes quite a bit to weigh up appropriately. I remember talking with another security engineer, he made a very interesting comment, the most secure system he could think of, would be a computer, without internet access, locked in a safe, and then no one knows where the safe is. Of course whilst it was secure, it wouldn't be very useable.
The problem is that most non-IT people don't really understand the true nature of the risks to corporate IT (for the record I'm happy to sit down with non-IT people and show them the risks with non-secured IT). It ranges from "script kiddies" who have little technical ability, and yet they have downloaded "hacking programs" which simply looks for networks which can be attacked via certain methods, to an actual concerted effort to breach security on a network. In a previous life I used to be a security engineer, I remember one place where I was brought in to look after a network where the previous administrator had no idea how to secure a network. As a result the network had been successfully hacked, twice.
It was not a major target, it was just one where "everything open and easy" had been adopted. As a result certain people had no problems at all getting in and causing major havoc. Of course the network needed to be seriously locked down to prevent it from happening again.
Now I'm not going to stand here and defend the actions of all IT people. There are absolutely IT guys out there who get a thrill from denying access to things (they are the ones who call themselves "God") but most IT policies have been developed as a direct response to a very real threat.