To provide effective and resilient security mechanisms, the paradigm of “Zero Trust” (ZT) has been evolving in the industry and government sectors, where the principle of “never trust, always verify” is enforced to secure the network level and computation level resources in the data center. This paradigm transforms the current defense strategies away from static network perimeters (that can be impacted by e.g., man-in-the-middle attacks or insider attacks), and the paradigm is shifted to a distributed security approach. With such an approach, many of the primary vulnerability points are eliminated and the focus is on users, assets and resources with: (i) identity verification and access control, (ii) resource protection, (iii) policy orchestration, (iv) monitoring and analytics, and (v) continuous operations and threat mitigation. However, deploying ZT solutions requires large amount/overhead of computation (e.g., traffic flows encryption, anomaly detection using deep learning), storage (e.g., to store activity logs at per-device/per-user granularity) and network resources (e.g., threat intelligence sharing) that may not always be generally available to secure a system. This talk presents methods to transition Enterprise ZT solutions to the Tactical Warfighting Edge by creating innovations through a low-overhead ZT reference architecture and its implementation in the denied, disrupted, intermittent and limited environments. The DOD collaborators for this project include: Defense Information Systems Agency (DISA) and Naval Research Laboratory (NRL).