I didn't do full benchmark workups at the time because it wasn't in the scope of my investigation. We were trying to nail down where the slowdowns were coming from to make sure it wasn't intrinsic to any of our installation process program suite. Both AMD and Intel systems showed similar degrees of performance deterioration for user functions between a historic image and our current one with the same software installed. I will grant that this was last looked at before MS did their famous AMD mitigations patch a while back where they straight up admitted to enforcing unneeded mitigations on certain AMD processors, but in a cursory look, that didn't make a big change for our numbers.
In general, both Windows and Linux are having to do extra work to improve system security. IMHO, Linux distro seem to age a bit more gracefully because that's what I see in production, but it's not entirely free of this issue. And, no, I can't just choose to turn off all mitigations. That would worsen our organization's security posture. Also, it's not ALL on the OS (excluding microcode changes) as the software itself has to do more work verifying inputs don't overrun buffers and verifying their own internal file integrity. Unless they are patching out performance bugs, security updates often worsen performance.
It also depends on the processor on how well it comes with OS changes. We had a large batch of 7th Gen i5 processors in production that we're getting absolutely hammered by this. Stuff that had limited L3 amounts and less than 8 threads was really suffering. Protecting memory access causes tons of process stalls. 4 core HT processors made a big difference. It was less noticeable on the Ice Lake and tiger lake laptops that we looked at, even with their I/o mitigations in place.