Sensitive values such as raw encryption keys should not be included in your Terraform code, and should be stored securely by a secrets manager.
The encryption key should be considered compromised as it is not stored securely.
Reference a managed key rather than include the key in raw format.
The following example will fail the google-compute-disk-encryption-required check.
The following example will pass the google-compute-disk-encryption-required check.